Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 239. Отображено 100.
12-07-2012 дата публикации

Column address strobe write latency (cwl) calibration in a memory system

Номер: US20120176850A1
Принадлежит: International Business Machines Corp

Column address strobe write latency (CWL) calibration including a method for calibrating a memory system. The method includes entering a test mode at a memory device and measuring a CWL at the memory device. A difference between the measured CWL and a programmed CWL is calculated. The calculated difference is transmitted to a memory controller that uses the calculated difference for adjusting a timing delay to match the measured CWL.

Подробнее
06-09-2012 дата публикации

Self-Healing and Diagnostic Screen

Номер: US20120223904A1
Принадлежит: International Business Machines Corp

A method, system, and computer program product for determining a level of cleanliness of a multi-touch screen display, characterizing objects that make contact with the screen, and initiating a specific maintenance action on the screen, based on screen cleanliness and the object(s) characterization(s). A screen diagnostic and maintenance (SDM) utility initiates a number of procedures to determine the type of object(s) and a set of characteristics of object(s) that make contact with the touch screen. Based on the results of the procedures, the SDM utility characterizes/identifies the object(s). In addition, the SDM utility initiates maintenance screen check(s) based on information stored in maintenance configuration file(s). Based on the results of the maintenance check(s), configuration file(s) data and type and characterization of the object(s) that have made contact with the screen, the SDM utility determines the type of maintenance that is performed and the timing/schedule of the maintenance action(s).

Подробнее
01-11-2012 дата публикации

System for online compromise tool

Номер: US20120278867A1
Автор: Jason A. Cox, Lydia M. Do
Принадлежит: International Business Machines Corp

An Activity Access Control (AAC) utility controls access to applications and devices by allowing an administrator to set terms of use/access regarding a applications and/or devices for a group of users, whose activity are monitored. The AAC utility also enables administrator and user access to a compromise facility via a centralized access point to establish or request changes to the terms of use/access. The AAC utility allows the administrator to dynamically update information and set terms based on real-time information collected during activity monitoring. Dynamic updates may also occur based on the monitored user's request, the priority of the requesting user(s), historical data, occurrence of a special event, completion of other internal or/external tasks, and/or pre-set limitations or thresholds. In addition, the AAC utility facilitates the real-time display or publishing of the terms of use, status information, and statistical information to users and the administrator.

Подробнее
15-11-2012 дата публикации

DYNAMIC, USER-DRIVEN SERVICE CATALOG

Номер: US20120290678A1

Embodiments of the invention are directed to a dynamic, user-driven service catalog based on real-time inputs by an end-user based on an automated evaluation process. Authorized end-users may directly submit services into the service catalog that are of value to the end-user, his/her peers, departments, groups, etc. Each service is analyzed to determine its viability as it matches an organization's cost and product offerings. This approach allows for more complex IT service models, wherein concurrent service requests can be compared, analyzed, and eventually fulfilled. Specifically, a catalog update tool provides this capability. The catalog update tool includes a plausibility engine configured to receive a request to add a service to a service catalog and evaluate whether the request can be added to the service catalog based on an analysis of system-integrated criteria. The catalog update tool further includes a cost engine to determine a cost for fulfilling the request, and a service request management module configured to add the service to the service catalog based on the analysis of system-integrated criteria and the cost for fulfilling the request.

Подробнее
16-05-2013 дата публикации

SYSTEM AND METHOD FOR COMMUNICATION THREAD MANAGEMENT

Номер: US20130124643A1

Described are systems and methods for managing an electronic communication thread. A thread is identified between a first electronic device and a plurality of second electronic devices. A parameter is generated to stop watching communications generated by the second electronic devices related to the thread. At least one new communication from the second electronic devices is detected, the at least one new communication related to the thread. An action is performed in accordance with criteria established with respect to the thread in response to detecting the at least one new communication. 1. A computer-implemented method for managing an electronic communication thread , comprising:identifying a thread between a first electronic device and a plurality of second electronic devices;generating a parameter to stop watching communications generated by the second electronic devices related to the thread;detecting at least one new communication from the second electronic devices, the at least one new communication related to the thread; andperforming an action in accordance with criteria established with respect to the thread in response to detecting the at least one new communication.2. The computer-implemented method of claim 1 , wherein the original communication and the at least one new communication includes email messages.3. The computer-implemented method of claim 1 , further comprising:forming a communication watch list in response to generating the original communication;preparing a first response to a first reply communication of the at least one new communication, the first reply communication sent from a second electronic device of the plurality of second electronic devices;generating a response template;receiving a second reply communication subsequent to receiving the first reply communication, the second reply communication sent from another second electronic device of the plurality of second electronic devices; andreplying with the response template at the ...

Подробнее
16-05-2013 дата публикации

Pairing Physical Devices To Virtual Devices To Create An Immersive Environment

Номер: US20130125113A1

Pairing physical devices to virtual devices to create an immersive environment, including: identifying, by a device pairing module, a virtual device in a virtual environment; identifying, by the device pairing module, a physical device in a physical environment; and pairing, by the device pairing module, the virtual device in the virtual environment with the physical device in the physical environment such that the physical device in the physical environment delivers virtual environment content, wherein the virtual environment content is content being delivered to an object in the virtual environment. 1. A method of pairing physical devices to virtual devices to create an immersive environment , the method comprising:identifying, by a device pairing module, a virtual device in a virtual environment;identifying, by the device pairing module, a physical device in a physical environment; andpairing, by the device pairing module, the virtual device in the virtual environment with the physical device in the physical environment such that the physical device in the physical environment delivers virtual environment content, wherein the virtual environment content is content being delivered to an object in the virtual environment.2. The method of further comprising:identifying, by the device pairing module, capabilities of the virtual device in the virtual environment;identifying, by the device pairing module, capabilities of the physical device in the physical environment; and whereinpairing, by the device pairing module, the virtual device in the virtual environment with the physical device in the physical environment includes pairing the virtual device in with the physical device in dependence upon the capabilities of the virtual device and the capabilities of the physical device.3. The method of further comprising delivering claim 1 , by the device pairing module claim 1 , virtual environment content to the physical device for presentation by the physical device.4. The ...

Подробнее
04-07-2013 дата публикации

Computing resource allocation based on query response analysis in a networked computing environment

Номер: US20130173597A1
Принадлежит: International Business Machines Corp

An approach for allocating computing resources based on a confidence level associated with responses to queries is provided. In a typical embodiment, a query is received from a querying user, and a search for a response to the query is conducted. A confidence level associated with the response is then determined. If the confidence level of the response does not meet a predetermined threshold, additional computing resources are allocated, and the search and corresponding response are updated (e.g., iteratively). An updated confidence level based on the updated response is then determined. Once the predetermined threshold has been met by the confidence level of the response, the response can be returned to the querying user.

Подробнее
19-09-2013 дата публикации

Social Interaction Analysis and Display

Номер: US20130241937A1
Принадлежит: International Business Machines Corp

Provided are techniques for storing information for identifying and characterizing a plurality of user characterizations associated with a social networking application; parsing a display associated with the social networking application to identify a first user characterization of the plurality of user characterizations; correlating the first user characterization to a first portion of the stored information; analyzing the first portion with respect to a first user-defined criteria; and in response to a determination that the first portion satisfies the first user-defined criteria, displaying, on the display, first data corresponding to the first portion in conjunction with a first indicia to enable the first data to be associated with the first user characterization.

Подробнее
24-10-2013 дата публикации

Propagation of Message Having Time-Based Information

Номер: US20130282836A1

A method for propagating a message includes searching a plurality of messages for time-based information; associating located time-based information with the corresponding message as meta-data; extracting the meta-data and propagating the message as the time-based information approaches; and displaying the propagated message in a graphical user interface. 1. A method for propagating a message , comprising:searching a plurality of messages for time-based information;propagating at least one message comprising time-based information as the time-based information approaches; anddisplaying the propagated message in a graphical user interface.2. A method according to claim 1 , wherein the time-based information comprises at least one of time claim 1 , date claim 1 , day claim 1 , or event information.3. A method according to claim 1 , wherein the message comprises an email message.4. A method according to claim 1 , wherein the message comprises a message or post in a social networking environment.5. A method according to claim 1 , wherein said propagating comprises transmitting the message out of queue before the time-based information occurs.6. A method according to claim 1 , comprising propagating at least one message before an event.7. A method according to claim 1 , comprising establishing a setting for an amount of time before an event in which at least one message having associated meta-data is propagated.8. A method according to claim 7 , wherein said setting comprises at least one of a setting for a specific user or a setting according to a social network relationship.9. A method according to claim 1 , comprising propagating at least one message after an event.10. A method according to claim 9 , wherein the at least one message remains propagated until a user marks it as done.11. A method according to claim 9 , wherein the at least one message remains propagated pursuant to a time lapse indicator.12. A method according to claim 1 , comprising establishing a ...

Подробнее
24-10-2013 дата публикации

Virtual world embedded security watermarking

Номер: US20130283055A1
Принадлежит: International Business Machines Corp

A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar in a virtual world. The watermark engine creates a watermark for the avatar using the security information and associates the watermark with the avatar. The watermark may comprise at least one of: security preferences for the avatar, contact information for an owner of the avatar, and graphical information to cause alteration of the avatar when the avatar is recorded.

Подробнее
14-11-2013 дата публикации

Self-Healing and Diagnostic Screen

Номер: US20130300701A1
Принадлежит:

A device and computer program product for determining a level of cleanliness of a multi-touch screen display, characterizing objects that make contact with the screen, and initiating a specific maintenance action on the screen, based on screen cleanliness and the object(s) characterization(s). A screen diagnostic and maintenance (SDM) utility initiates a number of procedures to determine the type of object(s) and a set of characteristics of object(s) that make contact with the touch screen. Based on the results of the procedures, the SDM utility characterizes/identifies the object(s). In addition, the SDM utility initiates maintenance screen check(s) based on information stored in maintenance configuration file(s). Based on the results of the maintenance check(s), configuration file(s) data and type and characterization of the object(s) that have made contact with the screen, the SDM utility determines the type of maintenance that is performed and the timing/schedule of the maintenance action(s). 1. An electronic device comprising:a processor;a memory system coupled to the processor and which stores one or more of a maintenance configuration file, a maintenance records file, and an object recognition facility that facilitates characterization of objects;a multiple detection touch screen;a screen maintenance facility executing on the processor and which provides a number of maintenance actions, including one or more notifications; and detect an occurrence of a contact by the object with the touch screen;', 'automatically determine a set of characteristics of the object following the occurrence of the contact with the touch screen;', 'dynamically activate a set of maintenance actions to enhance a level of cleanliness of the touch screen, based on one or more determined factors from the set of characteristics; and', 'display a list of maintenance tasks to be completed by a user to execute one or more of the maintenance actions., 'a screen diagnostic and maintenance ( ...

Подробнее
14-11-2013 дата публикации

COMMUNICATIONS SECURITY MANAGEMENT

Номер: US20130305316A1

Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions. 1. A system , comprising:a computer processor; andlogic executable by the computer processor, the logic configured to implement a method, the method including:creating levels of permissions for association with inbound communications, each of the levels of permissions defined as an incrementally-adjustable level of trust, the levels of permissions indicative of components of the inbound communications enabled for transmission to a recipient computer;creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions; andin response to identifying, via the computer processor, an inbound communication received from a sender:evaluating content of the inbound communication and determining a trust value for the inbound communication responsive to the evaluating;applying the conditions to the inbound communication and the sender;determining an assignment of one of the levels of permissions for the ...

Подробнее
14-11-2013 дата публикации

COMMUNICATIONS SECURITY MANAGEMENT

Номер: US20130305318A1

Implementing communications security includes creating levels of permissions for association with inbound communications. The levels of permissions are indicative of components of the communications enabled for transmission to a recipient computer. The communications security also includes creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions. In response to identifying an inbound communication received from a sender, the communications security evaluates content of the inbound communication, determines a trust value for the inbound communication responsive to the evaluating, applies the conditions to the inbound communication and the sender, determines an assignment of one of the levels of permissions for the inbound communication in response to applying the conditions, and transmits the inbound communication to the recipient computer, including any components enabled for transmission, based on the assignment of the level of permissions. 1. A computer program product comprising a storage medium having computer-readable program code embodied thereon , which when executed by a computer processor , causes the computer processor to implement a method , the method comprising:creating levels of permissions for association with inbound communications, each of the levels of permissions defined as an incrementally-adjustable level of trust, the levels of permissions indicative of components of the inbound communications enabled for transmission to a recipient computer;creating conditions upon which currently-assigned levels of permissions are adjustable to a next level of the levels of permissions; andin response to identifying an inbound communication received from a sender:evaluating content of the inbound communication and determining a trust value for the inbound communication responsive to the evaluating;applying the conditions to the inbound communication and the sender;determining an ...

Подробнее
21-11-2013 дата публикации

Aggregating internet addresses in a networked computing environment

Номер: US20130311535A1
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide an approach for aggregating Internet addresses (e.g., Uniform Resource Locators (URLs)) in a networked computing environment. In a typical embodiment, a set of URLs is received (e.g., by a system/engine). Upon receipt, a composite URL comprising at least portions of each received URL is generated and associated with a newly generated web page. The received set of URLs are displayed on the web page in a list, or the like, that may be sorted according to a set of criteria.

Подробнее
12-12-2013 дата публикации

CALL-IN NUMBER FORMATTING ADJUSTMENT PER VIEWING DEVICE

Номер: US20130329871A1

Systems and methods for initiating a telephone call on a communication device receive, into a computerized device, an instruction to connect a communication device to a communication receiver using a call-in string comprising a call-in number and a pass code. The call-in string is parsed to separate the call-in number and the pass code, using the computerized device. A pause indicator is identified in the call-in string, using the computerized device. The pause indicator is formatted to a type-specific format appropriate for the type of communication device, using the computerized device. The call-in number is transmitted from the computerized device to the communication receiver. A pause is executed, using the computerized device, according to the pause indicator formatted for a specific type of device. The pass code is transmitted from the computerized device to the communication receiver. 1. A communication device comprising:a telephone device; and receive an instruction to connect said communication device to a communication network using a call-in string comprising a call-in number and a pass code;', 'parse said call-in string to separate said call-in number and said pass code;', 'identify a pause indicator in said call-in string;', 'format said pause indicator to a type-specific format appropriate for said communication device;', 'transmit said call-in number to a communication receiver by said telephone;', 'execute a pause according to said pause indicator formatted for a specific type of communication device; and', 'transmit said pass code to said communication receiver by said telephone., 'a processor operatively connected to said telephone device that executes an application to2. The communication device of claim 1 , said telephone device being selected from the group consisting of:Smartphones;tablets;e-books; andcombinations of above devices.3. The communication device of claim 1 , said identifying a pause indicator in said call-in string comprising ...

Подробнее
12-12-2013 дата публикации

CALL-IN NUMBER FORMATTING ADJUSTMENT PER VIEWING DEVICE

Номер: US20130329874A1

Systems and methods for initiating a telephone call on a communication device receive, into a computerized device, an instruction to connect a communication device to a communication receiver using a call-in string comprising a call-in number and a pass code. The call-in string is parsed to separate the call-in number and the pass code, using the computerized device. A pause indicator is identified in the call-in string, using the computerized device. The pause indicator is formatted to a type-specific format appropriate for the type of communication device, using the computerized device. The call-in number is transmitted from the computerized device to the communication receiver. A pause is executed, using the computerized device, according to the pause indicator formatted for a specific type of device. The pass code is transmitted from the computerized device to the communication receiver. 1. A method comprising:receiving, into a computerized device, an instruction to connect a communication device to a communication receiver using a call-in string comprising a call-in number and a pass code;parsing said call-in string to separate said call-in number and said pass code, using said computerized device;identifying a pause indicator in said call-in string, using said computerized device;formatting said pause indicator to a type-specific format appropriate for said communication device, using said computerized device;transmitting said call-in number from said computerized device to said communication receiver;executing a pause, using said computerized device, according to said pause indicator formatted for a specific type of communication device; andtransmitting said pass code from said computerized device to said communication receiver.2. The method of claim 1 , said identifying a pause indicator in said call-in string comprising identifying at least one specific character indicating to said communication device to delay transmitting any next string of characters.3. ...

Подробнее
26-12-2013 дата публикации

Auto-Save, Retrieval, and Presentation of Key Press Sequences

Номер: US20130343529A1

An embodiment of the invention provides a method for communicating on a telecommunications device, wherein a telephone number is received from a user via an interface of the telecommunications device. At least one character from the user is also received via the interface in response to key press options presented to the user. The telephone number and the character received from the user are automatically saved on a memory device. The character is automatically associated with the telephone number. Contextual information associated with the character is saved, wherein the contextual information indicates the time of day that the character is entered, the date that the character is entered, and/or the type of call where the character is entered. The character is presented to the user in a list of previously entered characters on a display of the telecommunications device during a subsequent telephone call to the saved telephone number. 1. A system comprising:an interface, said interface receives a telephone number and at least one character from the user, the at least one character being received in response to key press options presented to the user;a options component connected to said interface, said options component presents the key press options to the user;a memory device connected to said interface, said memory device stores the telephone number and the at least one character received from the user; anda display connected to said memory device, said display presents the at least one character to the user during a subsequent telephone call.2. The system according to claim 1 , wherein the at least one character is associated with the telephone number in said memory device.3. The system according to claim 1 , wherein said interface receives at least one second character from the user during a subsequent telephone call claim 1 , wherein the at least one second character is different from the at least one character claim 1 , wherein the at least one second ...

Подробнее
26-12-2013 дата публикации

Targeted key press zones on an interactive display

Номер: US20130346904A1
Принадлежит: International Business Machines Corp

Method, computer program product, and system for performing an operation to facilitate selection of user interface (UI) elements on an interactive display, the operation including providing at least a first UI element on the interactive display, defining an input area which, when selected, activates the first UI element, determining a first likelihood of the first UI element being selected, and modifying the input area of the first UI element, based on the first likelihood.

Подробнее
26-12-2013 дата публикации

Targeted key press zones on an interactive display

Номер: US20130346905A1
Принадлежит: International Business Machines Corp

Method, computer program product, and system for performing an operation to facilitate selection of user interface (UI) elements on an interactive display, the operation including providing at least a first UI element on the interactive display, defining an input area which, when selected, activates the first UI element, determining a first likelihood of the first UI element being selected, and modifying the input area of the first UI element, based on the first likelihood.

Подробнее
02-01-2014 дата публикации

INTERACTIVE DVR SYSTEM

Номер: US20140007169A1

A method, program product and system are provided to enable a new software interface and program to manage DVR content including methods for separating storage partitions, e.g. by user and also on a shared basis on local media. The partitions may either be logical or physical partitions and may be allocated differently based on the user. In an exemplary illustration, a shared partition/buffer is used for multiple users who may each initiate the recording of various shows or recordings which may be shared by other users:The interactive shared partition is used to allow multi-room coordination, messaging, content cloning, user-to-user notifications, and specific user to user messaging facilities, with the capability of setting notifications for other parties on the addition/removal of content, “pushing” recommendations of shows to other users of a shared DVR system, and allowing messages to be left to other users regarding content. 1. A method for managing recorded program sharing in a digital video recorder (DVR) system , said DVR system including a plurality of users commonly connected to a video program source , said method comprising:assigning a first partition area of storage in said DVR system to a first user of said plurality of users for storing recorded programs for said first user;assigning a shared partition area of storage in said DVR system, said shared partition area being accessible by all of said plurality of users, said first partition area and said shared partition area being separate storage areas of a single DVR storage device; andresponsive to an input from said first user, transferring a video recording from said first partition area of storage to said shared partition area of storage.2. The method as set forth in and further including:responsive to a request from said first user to share a video recording in said first partition area with another user of said DVR system, providing a selection device for enabling said first user to choose a ...

Подробнее
09-01-2014 дата публикации

EVENT-BASED MANAGEMENT OF A COUPON PROMOTION

Номер: US20140012642A1

An approach for managing a coupon based on an event is presented. Information about an event is received. Attributes indicating an email or text message communication is from a retailer are received. The communication is received. The communication is determined to be from the retailer and include the coupon by determining the communication has the received attributes. Based on the communication having the attributes, the coupon included in the communication is associated with the event. A user selection of the event is received to display the received information about the event and a link to the communication that includes the coupon associated with the selected event. 1. A method of managing a coupon , the method comprising the steps of:a computer receiving information about an event;the computer receiving one or more attributes indicating a communication is from a retailer and includes a coupon, the communication being an email or a text message;the computer receiving the communication;the computer determining the communication is from the retailer and includes the coupon by determining the communication has the one or more attributes;based on the communication having the one or more attributes, the computer associating the coupon included in the communication with the event;the computer receiving from a first user a selection of the event; andresponsive to the step of receiving the selection of the event, the computer initiating a display including at least a part of the received information about the event and a link to the communication including the coupon associated with the selected event.2. The method of claim 1 , further comprising the steps of:the computer receiving a specification of a time period based on a starting time of the event; andthe computer determining the communication is received by the computer within the time period, wherein the step of associating the coupon included in the communication with the event is further based on the ...

Подробнее
30-01-2014 дата публикации

Graphically representing tags in a networked computing environment

Номер: US20140028708A1
Принадлежит: International Business Machines Corp

An approach for graphically representing tags in a networked computing environment is provided. In a typical embodiment, a frequency of use of each of a set of tags contained in at least one computer storage medium of the networked computing environment will be determined. A set of relationships between the set of tags will be identified, and each of the set of tags will be displayed within a set of objects of a graphical (e.g., Venn) diagram according to the frequency. The set of relationships between the set of tags may determine an amount of overlap of the set of objects. The set of tags and/or graphical objects may be formatted to graphically represent attributes such as: topics corresponding to the set of tags, groupings of the topics corresponding to the set of tags, trends related to the set of tags, an importance of the set of tags, etc.

Подробнее
01-01-2015 дата публикации

PROVIDING SITUATIONAL PRIORITY TO PLAYER COMMUNICATIONS IN A MULTI-PLAYER ENVIRONMENT

Номер: US20150005062A1
Принадлежит:

A method comprising identifying a communication channel where messages can be sent to a player of a multi-player video game application, monitoring the game application for a game event that applies to the player, generating a priority for a message in response to determining that the game event has occurred, and automatically modifying a message transmitted over the identified communication channel to the player based on the generated priority. 1. A method , comprising:identifying a communication channel where messages can be sent to a player of a multi-player video game application;monitoring the game application for a game event that applies to the player;generating a priority for a message in response to determining that the game event has occurred; andautomatically modifying a message transmitted over the identified communication channel to the player, wherein the message is modified based on the generated priority.2. The method of claim 1 , further comprising:automatically generating the message to the player.3. The method of claim 1 , wherein the message is received from a different player of the game application.4. The method of claim 1 , wherein the game event is an event that affects the performance of the player.5. The method of claim 4 , where the performance is comprised of a single player or multi-player mission objective or achievement.6. The method of claim 1 , wherein a game event is determined to occur in response to:determining that a player's performance will not meet a mission objective or achievement;determining that a player's performance is below a threshold for a mission objective or achievement;determining that a player's involvement is critical to accomplish a mission objective or achievement; ordetermining that the location of a player, relative to other players or game objects, is important to meeting a mission objective or achievement.7. The method of claim 6 , where the priority of a message is assigned a value proportional to the risk ...

Подробнее
01-01-2015 дата публикации

PROVIDING SITUATIONAL PRIORITY TO PLAYER COMMUNICATIONS IN A MULTI-PLAYER ENVIRONMENT

Номер: US20150005073A1
Принадлежит:

A computer program product including computer readable program code embodied on a computer readable storage medium for a multi-player video game application. The computer program product comprises computer readable program code for and a method comprising identifying a communication channel where messages can be sent to a player of a multi-player video game application, computer readable program code for monitoring the game application for a game event that applies to the player, computer readable program code for generating a priority for a message in response to determining that the game event has occurred, and computer readable program code for automatically modifying a message transmitted over the identified communication channel to the player based on the generated priority. 120-. (canceled)21. A computer program product including computer readable program code embodied on a computer readable storage medium , the computer program product comprising:computer readable program code for identifying a communication channel where messages can be sent to a player of a multi-player video game application;computer readable program code for monitoring the game application for a game event that applies to the player;computer readable program code for generating a priority for a message in response to determining that the game event has occurred; andcomputer readable program code for automatically modifying a message transmitted over the identified communication channel to the player, wherein the message is modified based on the generated priority.22. The computer program product of claim 21 , further comprising:computer readable program code for automatically generating the message to the player.23. The computer program product of claim 21 , wherein the message is received from a different player of the game application.24. The computer program product of claim 21 , wherein the game event is an event that affects the performance of the player.25. The computer program ...

Подробнее
08-01-2015 дата публикации

REDUNDANT ARRAY OF INDEPENDENT DISKS (RAID) SYSTEM BACKUP MANAGEMENT

Номер: US20150012701A1
Принадлежит:

Disclosed herein are RAID backup management systems and methods. According to an aspect, a method may include identifying portions of data in each of multiple storage units of a RAID system. The method may also include backing up data in the identified portions to a hot spare. Further, the method may include allocating storage space in the hot spare for the backup based on detection of errors among the storage units. 1. A system comprising:a plurality of storage units of a redundant array of independent disks (RAID) system; and identify portions of data in each of the storage units;', 'back up data in the identified portions to a hot spare; and', 'allocate storage space in the hot spare for the backup based on detection of errors among the storage units., 'a RAID controller configured to2. The system of claim 1 , wherein the RAID system is one of a RAID 5 system and a RAID 6 system.3. The system of claim 1 , wherein the RAID controller is configured to:determine a characteristic of one of the storage units; anddetermine an allocation of storage space in the hot spare based on the characteristic.4. The system of claim 3 , wherein the RAID controller is configured to determine a likelihood of failure of the one of the storage units.5. The system of claim 1 , wherein the RAID controller is configured to:compare at least one characteristic of the storage units to each other; anddetermine allocation of storage space for the hot spare based on the comparison.6. The system of claim 5 , wherein the RAID controller is configured to compare a likelihood of failure of the storage units to each other.7. The system of claim 5 , wherein comparing at least one characteristic comprises determining the storage unit having the highest likelihood of failure among the storage units claim 5 , wherein the size of the identified allocation of the storage space of the storage unit having the highest likelihood of failure is greater than the sizes of the memory of the other storage units.8. ...

Подробнее
08-01-2015 дата публикации

REDUNDANT ARRAY OF INDEPENDENT DISKS (RAID) SYSTEM BACKUP MANAGEMENT

Номер: US20150012775A1
Принадлежит:

Disclosed herein are RAID backup management systems and methods. According to an aspect, a method may include identifying portions of data in each of multiple storage units of a RAID system. The method may also include backing up data in the identified portions to a hot spare. Further, the method may include allocating storage space in the hot spare for the backup based on detection of errors among the storage units. 1. A method comprising:identifying portions of data in each of a plurality of storage units of a redundant array of independent disks (RAID) system;backing up data in the identified portions to a hot spare; andallocating storage space in the hot spare for the backup based on detection of errors among the storage units.2. The method of claim 1 , wherein the RAID system is one of a RAID 5 system and a RAID 6 system.3. The method of claim 1 , further comprising determining a characteristic of one of the storage units claim 1 , and wherein allocating storage space comprises determining an allocation of storage space in the hot spare based on the characteristic.4. The method of claim 3 , wherein determining a characteristic comprises determining a likelihood of failure of the one of the storage units.5. The method of claim 1 , wherein allocating storage space on the hot spare comprises:comparing at least one characteristic of the storage units to each other; anddetermining allocation of storage space for the hot spare based on the comparison.6. The method of claim 5 , wherein comparing at least one characteristic comprises comparing a likelihood of failure of the storage units to each other.7. The method of claim 5 , wherein comparing at least one characteristic comprises determining the storage unit having the highest likelihood of failure among the storage units claim 5 , wherein the size of the identified allocation of the storage space of the storage unit having the highest likelihood of failure is greater than the sizes of the memory of the other ...

Подробнее
11-01-2018 дата публикации

SYSTEM AND METHOD FOR SOCIAL AWARENESS TEXTILES

Номер: US20180013713A1
Принадлежит:

A method, computer program product, and computer system for identifying attribute information of at least a first wearable associated with an outfit of a user. Information about an event may be received. An electronic message may be sent about whether at least a portion of the outfit is recommended for wearing at the event based upon, at least in part, the attribute information of at least the first wearable and the information about the event. 1. A computer-implemented method comprising:identifying attribute information of at least a first wearable associated with an outfit of a user;receiving, via a user interface, an indication designating the first wearable as a master arbiter, wherein the master arbiter is a predetermined focus of the outfit and determines whether one or more portions of the outfit associated with the at least second wearable are recommended for wearing with a portion of the outfit associated with the master arbiter;receiving information about an event; andsending an electronic message about whether at least a portion of the outfit is recommended for wearing at the event based upon, at least in part, the attribute information of at least the first wearable and the information about the event.2. (canceled)3. The computer-implemented method of wherein identifying the attribute information of at least the first wearable associated with the outfit of the user includes receiving claim 1 , by the first wearable claim 1 , additional attribute information from at least a second wearable associated with the outfit of the user.4. The computer-implemented method of wherein the information about the event is received from a social media website.5. The computer-implemented method of wherein the information about the event is received from a scheduling application.6. The computer-implemented method of wherein the information about the event includes an indication of an attendee of the event wearing at least the portion of the outfit.7. The computer- ...

Подробнее
28-01-2016 дата публикации

Threat Condition Management

Номер: US20160026793A1
Принадлежит:

Methods, products, apparatuses, and systems may manage a threat condition. A plurality of triggers may be identified over a period of time. Each of the triggers may be associated with a threat risk value. An accumulation value may be determined based on an aggregation of each threat risk value over the period of time. A set of progressive threshold values associated with a set of progressive threat conditions may be defined. A threat condition from the set of threat conditions may be established for the device based on the accumulation value. The threat condition may be managed, for example by defining an operational mode for the device, in response to the threat condition. 1. An apparatus comprising a processor to:identify a plurality of triggers including a suspicion trigger to indicate suspicious activity for a device and a calming trigger to indicate calming activity for the device;determine an accumulation value based on an aggregation of each suspicion trigger and each calming trigger over a period of time;establish a threat condition based on the accumulation value; anddefine an operational mode for the device to manager the threat condition.2. The apparatus of claim 1 , wherein the processor is to generate the suspicion trigger and the calming trigger absent a security request and a security prompt.3. The apparatus of claim 1 , wherein the processor is to generate the suspicion trigger after a preset amount of time that is to indicate persistence of unusual usage of the device.4. The apparatus of claim 1 , wherein the processor is to:generate the suspicion trigger in response to a departure from an established usage pattern that is to indicate unusual usage of the device; andgenerate the calming trigger in response to a reversion towards an established usage pattern that is to indicate usual usage of the device.5. The apparatus of claim 1 , wherein the processor is to generate the calming trigger based on a disappearance of the suspicion trigger.6. The ...

Подробнее
29-01-2015 дата публикации

SHARING AN OVERLAPPING REGION IN A DISPLAY

Номер: US20150029076A1

A method, system, and/or computer program product enables the sharing of an overlapping area on a shared projection. A system detects an overlapping area on a shared projection, which presents content from a first projection and a second projection. A computing device identifies any redundant resources, which perform the same function as one another, in the first projection and the second projection. A consolidated resource, which provides the same function as the redundant resources, is defined and/or created, and then displayed in the overlapping area. 1. A computer program product for sharing an overlapping area on a shared projection , the computer program product comprising a computer readable storage medium having program code embodied therewith , the program code readable and executable by a processor to perform a method comprising:detecting an overlapping area on a shared projection, wherein the shared projection presents content from a first projection and a second projection;identifying redundant resources in the first projection and the second projection, wherein the redundant resources are a first resource in the first projection and a second resource in the second projection that perform a same function; anddisplaying a consolidated resource in the overlapping area, wherein the consolidated resource provides the same function as the first resource from the first projection and the second resource from the second projection.2. The computer program product of claim 1 , wherein the method further comprises:in response to detecting the overlapping area, identifying watermarks in the first projection and the second projection, wherein watermark information in the watermarks identifies at least one of a media access control (MAC) address, a near field communication (NFC) identifier, and an internet protocol (IP) address of source systems of the first projection and the second projection.3. The computer program product of claim 1 , wherein the method further ...

Подробнее
29-01-2015 дата публикации

SHARING AN OVERLAPPING REGION IN A DISPLAY

Номер: US20150029077A1

A method, system, and/or computer program product enables the sharing of an overlapping area on a shared projection. A system detects an overlapping area on a shared projection, which presents content from a first projection and a second projection. A computing device identifies any redundant resources, which perform the same function as one another, in the first projection and the second projection. A consolidated resource, which provides the same function as the redundant resources, is defined and/or created, and then displayed in the overlapping area. 1. A method of sharing an overlapping area on a shared projection , the method comprising:detecting, by a computing device, an overlapping area on a shared projection, wherein the shared projection presents content from a first projection and a second projection;identifying, by a computing device, redundant resources in the first projection and the second projection, wherein the redundant resources are a first resource in the first projection and a second resource in the second projection that perform a same function; anddisplaying, by a computing device, a consolidated resource in the overlapping area, wherein the consolidated resource provides the same function as the first resource from the first projection and the second resource from the second projection.2. The method of claim 1 , further comprising:identifying, by a computing device, an inactive widget, wherein the inactive widget is a desktop widget in the first projection and the second projection that has not been activated for longer than a predefined period of time; anddisplaying the inactive widget in the overlapping area.3. The method of claim 1 , wherein the redundant resources are redundant desktop widgets claim 1 , and wherein the method further comprises:identifying, by a computing device, the redundant desktop widgets as desktop widgets that are non-interactive widgets that provide only informational data.4. The method of claim 1 , wherein the ...

Подробнее
04-02-2016 дата публикации

Excluding recipients of a message based on content of the message

Номер: US20160036748A1
Принадлежит: International Business Machines Corp

In an approach for excluding contacts from receiving a message within a social network environment, a computer receives a message to be sent by a first user in a social network environment and determines that content of the message includes objectionable language, wherein the objectionable language includes at least one of: a negative connotation, a negative term, and a negative content. Based on the determination of the named user in the message content and the objectionable language in the message content, the computer recommends excluding, prior to sending the message, the named user from receiving the message to be sent.

Подробнее
05-02-2015 дата публикации

REAL-TIME SHARED WEB BROWSING AMONG SOCIAL NETWORK CONTACTS

Номер: US20150039584A1

A determination is made that each of at least two social network contacts involved in a social messaging interaction initiate a separate web search associated with the social messaging interaction. A separate set of web search results returned to each of the at least two social network contacts is captured in association with each initiated separate web search. A combined live search results view that includes each captured separate set of web search results is provided to each of the at least two social network contacts. The combined live search results view provides navigation to web content returned to other social network contacts. 1. A method , comprising:determining, via a processor, that at least two social network contacts involved in a social messaging interaction each initiate a separate web search associated with the social messaging interaction;capturing, in association with each initiated separate web search, a separate set of web search results returned to each of the at least two social network contacts; andproviding, to each of the at least two social network contacts, a combined live search results view comprising each captured separate set of web search results, where the combined live search results view provides navigation to web content returned to other social network contacts.2. The method of claim 1 , further comprising:forming a temporary social navigation sub-network comprising the at least two social network contacts;configuring a combined live social browsing bar within the combined live search results view;providing a rendered photograph of each of the at least two social network contacts of the temporary social navigation sub-network within the combined live social browsing bar in association with the respective captured separate set of web search results associated with the respective social network contact; andconfiguring each rendered photograph as a selectable annotation that operates to invoke navigation of the separate set of web ...

Подробнее
05-02-2015 дата публикации

SHARING LOCAL CACHE FROM A FAILOVER NODE

Номер: US20150039718A1

Sharing local cache from a failover node, including: determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, where the second compute node is a mirrored copy of the first compute node; responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache; receiving, by the managing compute node, a memory access request; and sending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache. 1. A method of sharing local cache from a failover node , the method comprising:determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, wherein the second compute node is a mirrored copy of the first compute node;responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache;receiving, by the managing compute node, a memory access request; andsending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache.2. The method of wherein sending the memory access request to an appropriate local cache in the unified logical cache further comprises:determining whether the memory access request can be serviced by the local cache in the first compute node;responsive to determining that the memory access request cannot be serviced by the local cache in the first compute node, determining whether the memory access request can be serviced by the local cache in the second compute node; andresponsive to determining that the memory access request can be serviced by the local cache in ...

Подробнее
05-02-2015 дата публикации

SHARING LOCAL CACHE FROM A FAILOVER NODE

Номер: US20150039834A1

Sharing local cache from a failover node, including: determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, where the second compute node is a mirrored copy of the first compute node; responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache; receiving, by the managing compute node, a memory access request; and sending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache. 16-. (canceled)7. An apparatus for sharing local cache from a failover node , the apparatus comprising a computer processor , a computer memory operatively coupled to the computer processor , the computer memory having disposed within it computer program instructions that , when executed by the computer processor , cause the apparatus to carry out the steps of:determining, by a managing compute node, whether a first compute node and a second compute node each have a local cache, wherein the second compute node is a mirrored copy of the first compute node;responsive to determining that the first compute node and the second compute node each have a local cache, combining, by the managing compute node, local cache on the first compute node and local cache on the second compute node into unified logical cache;receiving, by the managing compute node, a memory access request; andsending, by the managing compute node, the memory access request to an appropriate local cache in the unified logical cache.8. The apparatus of wherein sending the memory access request to an appropriate local cache in the unified logical cache further comprises:determining whether the memory access request can be serviced by the local cache in the first compute node;responsive to determining that the memory ...

Подробнее
05-02-2015 дата публикации

REAL-TIME SHARED WEB BROWSING AMONG SOCIAL NETWORK CONTACTS

Номер: US20150039982A1

A determination is made that each of at least two social network contacts involved in a social messaging interaction initiate a separate web search associated with the social messaging interaction. A separate set of web search results returned to each of the at least two social network contacts is captured in association with each initiated separate web search. A combined live search results view that includes each captured separate set of web search results is provided to each of the at least two social network contacts. The combined live search results view provides navigation to web content returned to other social network contacts. 1. A system , comprising:an output module; and determine that at least two social network contacts involved in a social messaging interaction each initiate a separate web search associated with the social messaging interaction;', 'capture, in association with each initiated separate web search, a separate set of web search results returned to each of the at least two social network contacts; and', 'provide, via the output module, to each of the at least two social network contacts, a combined live search results view comprising each captured separate set of web search results, where the combined live search results view provides navigation to web content returned to other social network contacts., 'a processor programmed to2. The system of claim 1 , where the processor is further programmed to:form a temporary social navigation sub-network comprising the at least two social network contacts;configure a combined live social browsing bar within the combined live search results view;provide a rendered photograph of each of the at least two social network contacts of the temporary social navigation sub-network within the combined live social browsing bar in association with the respective captured separate set of web search results associated with the respective social network contact; andconfigure each rendered photograph as a selectable ...

Подробнее
12-02-2015 дата публикации

DISPLAY OF VIDEO CONTENT BASED ON A CONTEXT OF USER INTERFACE

Номер: US20150046816A1

Systems and methods for display of video content based on a context of user interface are disclosed. According to an aspect, a method includes displaying video content at a computing device. The method also includes determining contexts based on the displayed video content. For example, a context of video content may be determined based on metadata that indicates a subject of a portion of the video content. Further, the method includes receiving user selection of at least one of the contexts. The method includes presenting, at the computing device, one or more video frames associated with the user selection. 1. A system comprising:a computing device configured to:display video content at the computing device;determine a plurality of contexts based on the displayed video content;receive user selection of at least one of the contexts; andpresent, at the computing device, one or more video frames associated with the user selection.2. The system of claim 1 , wherein the computing device is configured to determine a plurality of contexts based on metadata that indicates a subject of different portions of the displayed video content.3. The system of claim 1 , wherein the computing device is configured to:determine a subject of media content being implemented by the computing device; anddetermine the one or more video frames based on the subject of media content and the user selection.4. The system of claim 3 , wherein the media content comprises one of a website claim 3 , video content claim 3 , text content claim 3 , and a computing device application.5. The system of claim 1 , wherein the computing device is configured to present claim 1 , at the computing device claim 1 , identification of the plurality of contexts for user selection.6. The system of claim 1 , wherein the one or more video frames are video frames of video content other than the displayed video content.7. The system of claim 1 , wherein the computing device is configured to:determine descriptive data ...

Подробнее
12-02-2015 дата публикации

DISPLAY OF VIDEO CONTENT BASED ON A CONTEXT OF USER INTERFACE

Номер: US20150046817A1

Systems and methods for display of video content based on a context of user interface are disclosed. According to an aspect, a method includes displaying video content at a computing device. The method also includes determining contexts based on the displayed video content. For example, a context of video content may be determined based on metadata that indicates a subject of a portion of the video content. Further, the method includes receiving user selection of at least one of the contexts. The method includes presenting, at the computing device, one or more video frames associated with the user selection. 1. A method comprising:displaying video content at a computing device;determining a plurality of contexts based on the displayed video content;receiving user selection of at least one of the contexts; andpresenting, at the computing device, one or more video frames associated with the user selection.2. The method of claim 1 , wherein determining a plurality of contexts comprises determining a plurality of contexts based on metadata that indicates a subject of different portions of the displayed video content.3. The method of claim 1 , further comprising:determining a subject of media content being implemented by the computing device; anddetermining the one or more video frames based on the subject of media content and the user selection.4. The method of claim 3 , wherein the media content comprises one of a website claim 3 , video content claim 3 , text content claim 3 , and a computing device application.5. The method of claim 1 , further comprising presenting claim 1 , at the computing device claim 1 , identification of the plurality of contexts for user selection.6. The method of claim 1 , wherein the one or more video frames are video frames of video content other than the displayed video content.7. The method of claim 1 , wherein determining a plurality of contexts comprises determining descriptive data associated with the displayed video content claim 1 , ...

Подробнее
05-03-2015 дата публикации

SECURITY RECOMMENDATIONS FOR PROVIDING INFORMATION IN A COMMUNICATION SYSTEM

Номер: US20150065087A1

A method of and system for receiving a communication is disclosed. A receiving device receives the communication. The method and system classify user information into a set of security levels. A caller from a source of potential callers is associated with a security rating within the set of security levels. Using at least one caller-identification resource, the communication can be identified as being related to the caller with the security rating. The method and system determine a recommendation for providing user information. The recommendation may be based on the security rating within the set of security levels. The determined recommendation for providing user information in response to the communication is issued. 1. A computer-implemented method for receiving a communication at a receiving device , the method comprising:classifying user information into a set of security levels;associating a caller from a source of potential callers with a security rating within the set of security levels;identifying, by the receiving device using at least one caller-identification resource, the communication as being related to the caller with the security rating;determining, by the receiving device, a recommendation for providing user information, based on the security rating within the set of security levels, in response to identifying the communication as being associated to at least one caller with at least one security rating; andissuing, by the receiving device, the determined recommendation for providing user information in response to the communication.2. The method of claim 1 , wherein issuing the recommendation for providing user information includes displaying claim 1 , using the receiving device claim 1 , the determined recommendation for providing user information during the communication.3. The method of claim 1 , wherein using at least one caller-identification-resource includes selecting at least one resource consisting of: a contact list claim 1 , a social ...

Подробнее
05-03-2015 дата публикации

GEOGRAPHIC AREA AND CATEGORY SPECIFIC CONTENT SHARING BETWEEN MOBILE DEVICES

Номер: US20150065172A1

A method, system, and/or computer program product automatically shares content between mobile devices. Permissible geographic areas for sharing digital content from a user's mobile device are received, where the digital content is from a user-approved category of digital content. A determination is made as to whether an authorized mobile receiving device is within a specific permitted geographic area from the permissible geographic areas. In response to determining that the authorized mobile receiving device is within the specific permitted geographic area, the digital content is automatically shared between the user's mobile device and the authorized mobile receiving device. 1. A method of automatically sharing content between mobile devices , the method comprising:receiving permissible geographic areas for sharing digital content from a user's mobile device, wherein the digital content is from a user-approved category of digital content;determining whether an authorized mobile receiving device is within a specific permitted geographic area from the permissible geographic areas; andin response to determining that the authorized mobile receiving device is within the specific permitted geographic area, automatically sharing, by one or more processors, the digital content between the user's mobile device and the authorized mobile receiving device.2. The method of claim 1 , wherein the digital content is streaming content that is streamed from the user's mobile device to the authorized mobile receiving device.3. The method of claim 1 , further comprising:receiving a permissible set of users who are authorized to receive the digital content;determining whether any user from the permissible set of users is currently within the specific permitted geographic area; andin response to determining that no user from the permissible set of users is currently within the specific permitted geographic area, blocking the sharing of the digital content between the user's mobile ...

Подробнее
05-03-2015 дата публикации

Player generated content management

Номер: US20150065251A1
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide a method, system and computer program product for managing player generated content. In an embodiment of the invention, a method for managing player generated content includes recording player generated content for a game playing session into memory of a computer and collecting game metrics for the game playing session during the game playing session. The method also can include comparing the game metrics to one or more pre-stored threshold values. Finally, the method includes determining whether or not to discard the player generated content based upon the comparison and storing in fixed storage of the computer only player generated content determined based upon the comparison not to be discarded.

Подробнее
05-03-2015 дата публикации

PLAYER GENERATED CONTENT MANAGEMENT

Номер: US20150065256A1

Embodiments of the present invention provide a method, system and computer program product for managing player generated content. In an embodiment of the invention, a method for managing player generated content includes recording player generated content for a game playing session into memory of a computer and collecting game metrics for the game playing session during the game playing session. The method also can include comparing the game metrics to one or more pre-stored threshold values. Finally, the method includes determining whether or not to discard the player generated content based upon the comparison and storing in fixed storage of the computer only player generated content determined based upon the comparison not to be discarded. 1. A method for managing player generated content , the method comprising:recording player generated content for a game playing session into memory of a computer;collecting game metrics for the game playing session during the game playing session;comparing the game metrics to one or more pre-stored threshold values; and,determining whether or not to discard the player generated content based upon the comparison and storing in fixed storage of the computer only player generated content determined based upon the comparison not to be discarded.2. The method of claim 1 , further comprising naming the player generated content in the fixed storage using at least a portion of the game metrics.3. The method of claim 1 , where individual ones of the game metrics are compared to corresponding ones of the pre-stored threshold values.4. The method of claim 1 , wherein individual ones of the game metrics are weighted and aggregated to produce an aggregate score and the aggregate score is compared to a pre-stored threshold value.5. The method of claim 1 , wherein the game metrics are metrics selected from the group consisting of a score of the game playing session claim 1 , an amount of experience acquired during the game playing session ...

Подробнее
05-03-2015 дата публикации

Threat Condition Management

Номер: US20150067865A1
Принадлежит: International Business Machines Corp

Methods, products, apparatuses, and systems may manage a threat condition. A plurality of triggers may be identified over a period of time. Each of the triggers may be associated with a threat risk value. An accumulation value may be determined based on an aggregation of each threat risk value over the period of time. A set of progressive threshold values associated with a set of progressive threat conditions may be defined. A threat condition from the set of threat conditions may be established for the device based on the accumulation value. The threat condition may be managed, for example by defining an operational mode for the device, in response to the threat condition.

Подробнее
02-03-2017 дата публикации

SECURE WIRELESS POWER ACCESS PROTOCOL SUITED FOR IMPLEMENTING LEVELS OF SERVICE IN PUBLIC AND PRIVATE ENVIRONMENTS

Номер: US20170063099A1
Принадлежит:

Embodiments are directed to a system for transferring power wirelessly from a transmitter to a receiver, the transmitter having a transmitter processor and a transmitter antenna. The system includes the transmitter processor configured to convert electric power signals to an electromagnetic field (EMF); associate each of a plurality of keys with one of a plurality of operating frequencies, and store the plurality of keys associated with the plurality of operating frequencies in a table; select one of the plurality of operating frequencies stored in the table as an active operating frequency, wherein the active operating frequency is assigned as the current operating frequency of the transmitter antenna, and wherein the key associated with the active operating frequency is assigned as an active key; wirelessly transmit to the receiver the EMF at the active operating frequency; and wirelessly transmit to the receiver the table and an identification of the active key. 1. A power transfer system for transferring power wirelessly from a transmitter to a receiver , the transmitter having at least one transmitter processor circuit and at least one transmitter antenna circuit , the system comprising:the at least one transmitter processor circuit configured to:convert an electric power signal to an electromagnetic field (EMF);associate each of a plurality of keys with one of a plurality of operating frequencies, and store the plurality of keys associated with the plurality of operating frequencies in a table;select one of the plurality of operating frequencies stored in the table as an active operating frequency, wherein the active operating frequency is assigned as the current operating frequency of the transmitter antenna circuit, and wherein the key associated with the active operating frequency is assigned as an active key;wirelessly transmit to the receiver, using the at least one transmitter antenna circuit, the EMF at the active operating frequency; andwirelessly ...

Подробнее
02-03-2017 дата публикации

SECURE WIRELESS POWER ACCESS PROTOCOL SUITED FOR IMPLEMENTING LEVELS OF SERVICE IN PUBLIC AND PRIVATE ENVIRONMENTS

Номер: US20170063103A1
Принадлежит:

Embodiments are directed to a system for transferring power wirelessly from a transmitter to a receiver, the transmitter having a transmitter processor and a transmitter antenna. The system includes the transmitter processor configured to convert electric power signals to an electromagnetic field (EMF); associate each of a plurality of keys with one of a plurality of operating frequencies, and store the plurality of keys associated with the plurality of operating frequencies in a table; select one of the plurality of operating frequencies stored in the table as an active operating frequency, wherein the active operating frequency is assigned as the current operating frequency of the transmitter antenna, and wherein the key associated with the active operating frequency is assigned as an active key; wirelessly transmit to the receiver the EMF at the active operating frequency; and wirelessly transmit to the receiver the table and an identification of the active key. 1. A method of wirelessly transferring electric power from a transmitter to a receiver , the transmitter having at least one transmitter processor circuit and at least one transmitter antenna circuit , the method comprising:converting, using the at least one transmitter processor circuit, an electric power signal to an electromagnetic field (EMF);associating, using the at least one transmitter processor circuit, each of a plurality of keys with one of a plurality of operating frequencies, and storing the plurality of keys associated with the plurality of operating frequencies in a table;selecting, using the at least one transmitter processor circuit, one of the plurality of operating frequencies stored in the table as an active operating frequency, wherein the active operating frequency is assigned as the current operating frequency of the transmitter antenna circuit, and wherein the key associated with the active operating frequency is assigned as an active key;wirelessly transmitting to the receiver, ...

Подробнее
12-03-2015 дата публикации

STORAGE SPACE SAVINGS VIA PARTIAL DIGITAL STREAM DELETION

Номер: US20150071599A1

A method, computer system, and/or computer program product enables a reuse of media storage space via partial file deletion. Multiple friends in a same social circle, which together have control of multiple media storage devices that are storing all segments of a media file, are identified. A last friend from the multiple friends, who has control of a last media storage device to have a last copy of a particular segment of the media file, is identified. The last media storage device is the only media storage device, from the multiple storage devices, to have a copy of the particular segment of the media file. The last media storage device is prevented from deleting the particular segment of the media file until another of the multiple storage devices stores a copy of the particular segment of the media file. 1. A method of reusing media storage space via partial file deletion , the method comprising:identifying, by one or more processors, multiple friends, in a same social circle, that together have control of multiple media storage devices that are storing all segments of a media file;identifying, by one or more processors, a last friend, from the multiple friends, who has control of a last media storage device to have a last copy of a particular segment of the media file, wherein the last media storage device is the only media storage device, from the multiple storage devices, to have a copy of the particular segment of the media file; andpreventing, by one or more processors, the last media storage device from deleting the particular segment of the media file until another of the multiple storage devices stores a copy of the particular segment of the media file.2. The method of claim 1 , wherein the media storage device is from a group consisting of a Videocassette Recorder (VCR) claim 1 , a Personal Video Recorder (PVR) claim 1 , a Direct Access Storage Device (DASD) claim 1 , a hard file claim 1 , and a video surveillance media.3. The method of claim 1 , ...

Подробнее
29-05-2014 дата публикации

MANAGING A RETAIL OFFER

Номер: US20140149193A1

An approach for managing retail offer(s) based on information from a social networking website is presented. Information about an event is received. The event is determined to be relevant to user(s) of the social networking website by determining preferences of the user(s) and determining the user(s) have an interest in the event based on the preferences. Retail offers are received. Received retail offer(s) are determined to be relevant to the event by determining a preference of an individual associated with event and determining the individual has an interest in the retail offer(s) based on the preference. Based on the event being relevant to the user(s) and the retail offer(s) being relevant to the event, the retail offer(s) are displayed for viewing by the user(s) via an interface provided by the social networking website. 1. A method of managing one or more retail offers , the method comprising the steps of:a computer receiving information about an event; determining preferences of the one or more users, the preferences saved via the social network web site; and', 'determining the one or more users have an interest in the event based on the preferences;, 'the computer determining the event is relevant to one or more users of a social network web site bythe computer receiving a plurality of retail offers; determining at least one preference of an individual associated with the event, the at least one preference saved via the social network website; and', 'determining the individual has an interest in the one or more retail offers based on the at least one preference; and, 'the computer determining one or more retail offers included in the plurality of retail offers are relevant to the event bybased on the event being relevant to the one or more users and based on the one or more retail offers being relevant to the event, the computer initiating a display of the one or more retail offers for viewing by the one or more users via an interface provided by the social ...

Подробнее
29-05-2014 дата публикации

PROMOTIONAL ITEM DELIVERIES BASED ON PLANNED/FUTURE TRAVELING

Номер: US20140149218A1

An approach for managing electronic promotional item(s) is presented. A plurality of subscriptions is submitted to at least one software service on behalf of a user. The submitted subscriptions are associated with respective geographical locations within a threshold distance from a travel route of a trip to a destination. The electronic promotional item(s) associated with respective geographical location(s) within the threshold distance are received from the at least one software service. The received electronic promotional item(s) are determined to be in effect between start and end dates of the trip. Based on the received electronic promotional item(s) being in effect between the start and end dates, at least a portion of the received electronic promotional item(s) is presented. 1. A method of managing electronic promotional item(s) , the method comprising the steps of:a computer subscribing to at least one software service that delivers electronic promotional items to subscribers by submitting a plurality of subscriptions to the at least one software service on behalf of a user, the subscriptions in the plurality of subscriptions being associated with respective geographical locations within a threshold distance from a travel route of a trip to a destination;subsequent to the step of subscribing to the at least one software service, the computer receiving the electronic promotional items(s) from the at least one software service, the electronic promotional item(s) associated with respective geographical location(s) included in the geographical locations within the threshold distance;the computer determining the received electronic promotional item(s) will be in effect at respective point(s) in time between and inclusive of a start date of the trip and an end date of the trip; andbased on the received electronic promotional item(s) being in effect at the point(s) in time between and inclusive of the start and end dates, the computer generating a presentation ...

Подробнее
29-05-2014 дата публикации

METHOD, APPARATUS AND COMPUTER PROGRAM TO DESIGNATE CONTENT RETRIEVAL ON AN INTERACTIVE DISPLAY

Номер: US20140149897A1

Disclosed is a method, computer program product and a system configured, in response to a user placing one or more markings at a first location on a display screen, creating a mapping between data representing the one or more markings; saving the data in a file that is identified at least in part by the mapping; and in response to the user inputting a command to retrieve the markings, retrieving the data from the file based on the mapping and rendering markings on the display screen at a second location specified by the user. 1. A method comprising:in response to a user placing one or more markings at a first location on a display screen, creating a mapping between data representing the one or more markings;saving the data in a file that is identified at least in part by the mapping; andin response to the user inputting a command to retrieve the markings, retrieving the data from the file based on the mapping and rendering markings on the display screen at a second location specified by the user.2. The method as in claim 1 , where the second location differs from the first location claim 1 , or is the first location where the one or more markings were placed on the display screen claim 1 , or comprises multiple other locations on the display screen where the one or more markings were placed on the display screen claim 1 , or is the first location where the one or more markings were placed on the display screen and one or more other locations on the display screen.3. The method as in claim 1 , where creating the mapping comprises at least one of using meta-data descriptive of at least one characteristic of an image formed by the markings claim 1 , user-specific meta-data claim 1 , content specific meta-data claim 1 , and context-specific meta-data.4. The method as in claim 1 , where creating the mapping uses a mapping system to automatically create content associations.5. The method as in claim 4 , where if no automatically created content associations exist then the ...

Подробнее
29-05-2014 дата публикации

METHOD, APPARATUS AND COMPUTER PROGRAM TO DESIGNATE CONTENT RETRIEVAL ON AN INTERACTIVE DISPLAY

Номер: US20140149898A1

Disclosed is a system configured, in response to a user placing one or more markings at a first location on a display screen, to create a mapping between data representing the one or more markings; to save the data in a file that is identified at least in part by the mapping; and in response to the user inputting a command to retrieve the markings, to retrieve the data from the file based on the mapping and to render markings on the display screen at a second location specified by the user. 1. A system , comprising:a touch responsive display screen;a controller connected with the touch responsive display screen; anda host system connected with the controller, the host system comprising a computer readable data storage medium storing computer program instructions connected with at least one data processor for executing the instructions, the at least one data processor being connected with at least one file storage medium and configured to perform operations that comprise,in response to a user placing one or more markings at a first location on a display screen, creating a mapping between data representing the one or more markings;saving the data in a file that is identified at least in part by the mapping; andin response to the user inputting a command to retrieve the markings, retrieving the data from the file based on the mapping and rendering markings on the display screen at a second location specified by the user.2. The system as in claim 1 , where the second location differs from the first location claim 1 , or is the first location where the one or more markings were placed on the display screen claim 1 , or comprises multiple other locations on the display screen where the one or more markings were placed on the display screen claim 1 , or is the first location where the one or more markings were placed on the display screen and one or more other locations on the display screen.3. The system as in claim 1 , where the operation of creating the mapping ...

Подробнее
05-06-2014 дата публикации

COLLABORATIVE OVERLAY OF USER INTERFACE ELEMENTS RENDERED ON THE DISPLAY OF A COMPUTING DEVICE

Номер: US20140157159A1

Collaborative overlay of user interface elements rendered on the display of a computing device, including: identifying, by an overlay management module, one or more active elements of a user interface for a first application; selecting, by the overlay management module, a location on a user interface for a second application to place one or more of the active elements of the user interface for the first application; and displaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application. 18-. (canceled)9. An apparatus for collaborative overlay of user interface elements rendered on a display device , the apparatus comprising a computer processor , a computer memory operatively coupled to the computer processor , the computer memory having disposed within it computer program instructions that , when executed by the computer processor , cause the apparatus to carry out the steps of:identifying, by an overlay management module, one or more active elements of a user interface for a first application;selecting, by the overlay management module, a location on a user interface for a second application to place one or more of the active elements of the user interface for the first application; anddisplaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application.10. The apparatus of further comprising computer program instructions that claim 9 , when executed by the computer processor claim 9 , cause the apparatus to carry out the step of:determining, by the overlay management module, an importance value for each active element of the user interface for the first application; andwherein displaying, by the overlay management module, the one or more of the active elements of the user interface for the ...

Подробнее
05-06-2014 дата публикации

COLLABORATIVE OVERLAY OF USER INTERFACE ELEMENTS RENDERED ON THE DISPLAY OF A COMPUTING DEVICE

Номер: US20140157160A1

Collaborative overlay of user interface elements rendered on the display of a computing device, including: identifying, by an overlay management module, one or more active elements of a user interface for a first application; selecting, by the overlay management module, a location on a user interface for a second application to place one or more of the active elements of the user interface for the first application; and displaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application. 1. A method of collaborative overlay of user interface elements rendered on the display of a computing device , the method comprising:identifying, by an overlay management module, one or more active elements of a user interface for a first application;selecting, by the overlay management module, a location on a user interface for a second application to place the one or more of the active elements of the user interface for the first application; anddisplaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application.2. The method of further comprising:determining, by the overlay management module, an importance value for each active element of the user interface for the first application; andwherein displaying, by the overlay management module, the one or more of the active elements of the user interface for the first application at the selected location on the user interface for the second application includes displaying the one or more of the active elements of the user interface for the first application in dependence upon the importance value for each active element of the user interface for the first application.3. The method of wherein determining claim 2 , by the overlay management module claim 2 , the ...

Подробнее
12-06-2014 дата публикации

Collaborative sharing of contextually similar cache data to reduce network usage

Номер: US20140162608A1
Принадлежит: International Business Machines Corp

A computer program product for controlling a wireless user device comprises computer usable program code for caching data downloaded from websites over a cellular communications network in response to user-entered requests for data; establishing near field communication directly between the wireless user device and other user devices within range of the near field communication; searching metadata stored by the other user devices, wherein the metadata is stored in association with cached data and describes one or more characteristic of the cached data; receiving a user request for data; for determining if the user request can be satisfied with cached data stored by a selected one of the other user devices; receiving cached data directly from the selected user device when the cached data satisfies the user request; and receiving data over the communications network when the cached data stored on the other user devices does not satisfy the user request.

Подробнее
12-06-2014 дата публикации

DETERMINING CHARACTERISTIC PARAMETERS FOR WEB PAGES

Номер: US20140164349A1

A computer receives a search request, wherein the search request contains one or more parameters that allow a search to be performed. Responsive to the search request, the computer identifies a plurality of web pages connected by a plurality of links. The computer determines the number of links in the longest path that connects at least a portion of the plurality of web pages, wherein the longest path includes a sequence of at least two web pages of the plurality of web pages connected by a link of the plurality of links. The computer determines the number of links included in a web page of the plurality of web pages. 1. A method for determining characteristic parameters for web pages , the method comprising:a computer receiving a search request, wherein the search request contains one or more parameters that allow a search to be performed;responsive to performing the search, the computer identifying a plurality of web pages connected by a plurality of links;the computer determining a number of links included in a longest path that connects at least a portion of the plurality of web pages, wherein the longest path includes a sequence of at least two web pages of the plurality of web pages connected by a link of the plurality of links; andthe computer determining a number of links included in a web page of the plurality of web pages.2. The method of claim 1 , wherein the longest path that connects at least a portion of the plurality of web pages does not include a repetition of one or both of the links and web pages included in the longest path.3. The method of claim 1 , wherein one or both of the determined number of links in the longest path and the determined number of links included in the web page of the plurality of web pages include one or more links that satisfy a parameter used for the search.4. The method of claim 1 , further comprising the step of:the computer receiving a threshold value for one or both of the determined number of links in the longest path ...

Подробнее
12-06-2014 дата публикации

GUIDING A USER TO IDENTIFIED CONTENT IN A DOCUMENT

Номер: US20140164414A1

A method for identifying content in a document. The method includes determining that a user of a computing device has accessed one or more documents and determining a subject matter of the one or more documents. The method includes determining that the user has accessed at least one additional document. The method further includes searching the at least one additional document for the determined subject matter and responsive to finding the determined subject matter, identifying the found subject matter in the at least one additional document. 1. A computer-implemented method for identifying content in a document , the method comprising:determining, by a computing device, that a user of the computing device has accessed one or more documents of the computing device;determining, by the computing device, a subject matter of the one or more documents;determining, by the computing device, that the user has accessed at least one additional document of the computing device;searching the at least one additional document for the determined subject matter; andresponsive to finding the determined subject matter, identifying the found subject matter in the at least one additional document.2. The method of claim 1 , wherein the one or more documents and the at least one additional document comprise one or more of word processing documents claim 1 , spreadsheets claim 1 , text editing files claim 1 , presentation documents or web browser pages.3. The method of claim 1 , wherein said identifying the found subject matter on the at least one additional document comprises one or more of: marking the content by using colored text claim 1 , arrows pointing to the determined subject matter claim 1 , geometric figures surrounding the determined subject matter on the at least one additional document claim 1 , changing font type or style claim 1 , and annotating the at least one additional document.4. The method of claim 1 , wherein said determining the subject matter of the one or more ...

Подробнее
12-06-2014 дата публикации

COLLABORATIVE SHARING OF CONTEXTUALLY SIMILAR CACHE DATA TO REDUCE NETWORK USAGE

Номер: US20140164472A1

Wireless user devices can independently download and cache data from websites over a wireless communications network. In response to a request for data, a first user device may receive data directly from a second user device instead of receiving data over the communications network, if the data satisfies the request. Near field communications may be used for direct communication between user devices within range of the near field communication. Metadata describing the cached data may be stored in association with the cached data. Each user device may advertise its metadata and allow it to be searched by another user device that is requesting data. If the request can be satisfied with cached data stored by a selected user device, then the cached data is received directly from the selected user device, but the data is otherwise received over the communications network. 1. A method , comprising:a plurality of user devices independently downloading data from websites over a communications network in response to user-entered requests for data;each of the plurality of user devices caching the data that the user device has downloaded over the communications network; anda first one of the plurality of user devices, in response to a first user entering a request for data, receiving data directly from a second one of the plurality of user devices instead of receiving data over the communications network, wherein the data received from the second user device satisfies the request.2. The method of claim 1 , wherein each of the plurality of user devices caching the data that the user device has downloaded over the communications network includes each of the plurality of user devices selectively caching the data that the user device has downloaded over the communications network.3. The method of claim 2 , wherein the plurality of user devices selectively cache data that includes a single file having greater than a predetermined quantity of data.4. The method of claim 1 , further ...

Подробнее
02-04-2015 дата публикации

STREAMING PLAYBACK WITHIN A LIVE VIDEO CONFERENCE

Номер: US20150092009A1

A method for streaming playback within a live video conference. The method includes, a computer detecting access to a video conference using a live interface. The method includes, the computer receiving an indication of an interrupt condition. The method includes, the computer retrieving a selected content. The method includes, the computer inserting the selected content into the video conference, and the computer playing the selected content within the video conference. 1. A method for streaming playback within a live video conference , the method comprising:a computer detecting access to a video conference using a live interface;the computer receiving an indication of an interrupt condition;the computer retrieving, in response to the indication of an interrupt condition, a selected content;the computer inserting the selected content into the video conference; andthe computer playing the selected content within the video conference.2. The method of claim 1 , further comprising;the computer receiving an indication to end playback; andthe computer removing the selected content from the live video conference.3. The method of claim 1 , wherein an interrupt condition includes one or more of: a lighting adjustment claim 1 , a detected motion claim 1 , a detected sound claim 1 , a disruption of a network connection claim 1 , and a received key sequence.4. The method of claim 3 , wherein the detected motion further comprises:the computer detecting, based, at least in part, on using motion sensors, a user of the computer; andthe computer detecting a second user of the computer.5. The method of claim 1 , wherein the selected content is a video clip.6. The method of claim 1 , wherein the computer retrieving a selected content further comprises:the computer detecting a camera connected to the computer is currently recording;the computer receiving a recorded content from the camera; andthe computer storing the recorded content.7. A computer program product for streaming ...

Подробнее
19-06-2014 дата публикации

PROVIDING A USER-SPECIFIC EFFORT VALUE ASSOCIATED WITH DIGITAL TEXTUAL CONTENT

Номер: US20140170614A1

Methods, apparatuses, and computer program products are provided for providing a user-specific effort value associated with digital textual content. Typical embodiments include identifying a user read speed value; identifying a complexity value for a particular work of authorship; and calculating, in dependence upon the user read speed value and the complexity value, an individualized effort value for the work of authorship. 17-. (canceled)8. An apparatus for providing a user-specific effort value associated with digital textual content , the apparatus comprising a computer processor , a computer memory operatively coupled to the computer processor , the computer memory having disposed within it computer program instructions that , when executed by the computer processor , cause the apparatus to carry out the steps of:identifying a user read speed value;identifying a complexity value for a particular work of authorship; andcalculating, in dependence upon the user read speed value and the complexity value, an individualized effort value for the work of authorship.9. The apparatus of wherein identifying a user read speed value further comprises receiving from a user client device the user read speed value.10. The apparatus of wherein the computer memory has disposed within it computer program instructions that claim 8 , when executed by the computer processor claim 8 , cause the apparatus to carry out presenting to the user the individualized effort level value.11. The apparatus of wherein presenting to the user the individualized effort level value further comprises presenting to the user an average effort level value of other users.12. The apparatus of wherein the computer memory has disposed within it computer program instructions that claim 8 , when executed by the computer processor claim 8 , cause the apparatus to carry out identifying a length of the work of authorship and wherein:calculating an individualized effort value for the work of authorship further ...

Подробнее
19-06-2014 дата публикации

Providing A User-Specific Effort Value Associated With Digital Textual Content

Номер: US20140170615A1

Methods, apparatuses, and computer program products are provided for providing a user-specific effort value associated with digital textual content. Typical embodiments include identifying a user read speed value; identifying a complexity value for a particular work of authorship; and calculating, in dependence upon the user read speed value and the complexity value, an individualized effort value for the work of authorship. 1. A computer implemented method for providing a user-specific effort value associated with digital textual content , the method comprising:identifying, by an effort rating module of a computer server, a user read speed value, wherein the effort rating module includes automated computing machinery configured for providing a user-specific effort value;identifying, by the effort rating module, a complexity value for a particular work of authorship; andcalculating, by the effort rating module, in dependence upon the user read speed value and the complexity value, an individualized effort value for the work of authorship.2. The method of wherein identifying a user read speed value further comprises receiving from a user client device the user read speed value.3. The method of further comprising presenting to the user the individualized effort level value.4. The method of wherein presenting to the user the individualized effort level value further comprises presenting to the user an average effort level value of other users.5. The method of further comprising identifying a length of the work of authorship and wherein:calculating an individualized effort value for the work of authorship further comprises:calculating an individualized effort value for the work of authorship in dependence upon the user read speed value, the length of the work of authorship, and the complexity value.6. The method of further comprising calculating a predicted length of time to read the work of authorship in dependence upon the read speed value and the length of the work ...

Подробнее
19-06-2014 дата публикации

PRESENTING ENCLOSURE CACHE AS LOCAL CACHE IN AN ENCLOSURE ATTACHED SERVER

Номер: US20140173114A1

Presenting enclosure cache as local cache in an enclosure attached server, including: determining, by the enclosure, a cache hit rate for local server cache in each of a plurality of enclosure attached servers; determining, by the enclosure, an amount of available enclosure cache for use by one or more of the enclosure attached servers; and offering, by the enclosure, some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the amount of available enclosure cache. 1. A method of presenting enclosure cache as local cache in an enclosure attached server , the method comprising:determining, by the enclosure, a cache hit rate for local server cache in each of a plurality of enclosure attached servers;determining, by the enclosure, an amount of available enclosure cache for use by one or more of the enclosure attached servers; andoffering, by the enclosure, some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the amount of available enclosure cache.2. The method of further comprising:accepting, by the enclosure attached server, the available enclosure cache; andsending, from the enclosure attached server to the enclosure, an acceptance message.3. The method of wherein determining a cache hit rate for local server cache in each of a plurality of enclosure attached servers further comprises requesting claim 1 , from each of the plurality of enclosure attached servers claim 1 , the cache hit rate for local server cache.4. The method of wherein determining a cache hit rate for local server cache in each of a plurality of enclosure attached servers further comprises receiving claim 1 , from each of the plurality of enclosure attached servers claim 1 , a cache hit rate for local server cache.5. The method of wherein offering some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the ...

Подробнее
19-06-2014 дата публикации

Presenting Enclosure Cache As Local Cache In An Enclosure Attached Server

Номер: US20140173209A1

Presenting enclosure cache as local cache in an enclosure attached server, including: determining, by the enclosure, a cache hit rate for local server cache in each of a plurality of enclosure attached servers; determining, by the enclosure, an amount of available enclosure cache for use by one or more of the enclosure attached servers; and offering, by the enclosure, some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the amount of available enclosure cache. 16-. (canceled)7. An apparatus for presenting enclosure cache as local cache in an enclosure attached server , the apparatus comprising a computer processor , a computer memory operatively coupled to the computer processor , the computer memory having disposed within it computer program instructions that , when executed by the computer processor , cause the apparatus to carry out the steps of:determining, by the enclosure, a cache hit rate for local server cache in each of a plurality of enclosure attached servers;determining, by the enclosure, an amount of available enclosure cache for use by one or more of the enclosure attached servers; andoffering, by the enclosure, some portion of the available enclosure cache to an enclosure attached server in dependence upon the cache hit rate and the amount of available enclosure cache.8. The apparatus of further comprising computer program instructions that claim 7 , when executed by the computer processor claim 7 , cause the apparatus to carry out the steps of:accepting, by the enclosure attached server, the available enclosure cache; andsending, from the enclosure attached server to the enclosure, an acceptance message.9. The apparatus of wherein determining a cache hit rate for local server cache in each of a plurality of enclosure attached servers further comprises requesting claim 7 , from each of the plurality of enclosure attached servers claim 7 , the cache hit rate for local server cache.10. ...

Подробнее
09-04-2015 дата публикации

PRESENTATION OF PRODUCT RECOMMENDATIONS BASED ON SOCIAL INFORMATICS

Номер: US20150100452A1

A method, system, and/or computer program product presents product recommendations based on input derived from a user's social network. A description of a product selected for purchase by a user is received. A social networking site is searched for information relevant to a characterization the product. The relevant information is characterized according to a social relationship between the user and an other member of the social networking site, a product family of the product, and a product expertise of the other member about the product. Characterized information about the product is then presented to the user. 17-. (canceled)8. A computer program product for presenting product recommendations , the computer program product comprising a computer readable storage medium having program code embodied therewith , the program code readable and executable by a processor to perform a method comprising:receiving a description of a product selected for purchase by a user;searching a social networking site for information relevant to a characterization of the product;characterizing the information according to a social relationship between the user and an other member of the social networking site, a product family of the product, and a product expertise of the other member about the product; andpresenting characterized information about the product to the user.9. The computer program product of claim 8 , wherein the method performed by the processor executing the program code further comprises:in response to the user receiving the characterized information about the product, receiving a user selection action from the user, wherein the user selection action causes an automatic selection of a purchase option for the user to purchase the product.10. The computer program product of claim 8 , wherein the product is at least one of a merchandise and a service.11. The computer program product of claim 8 , wherein the method performed by the processor executing the program code ...

Подробнее
09-04-2015 дата публикации

Presentation of product recommendations based on social informatics

Номер: US20150100454A1
Принадлежит: International Business Machines Corp

A method, system, and/or computer program product presents product recommendations based on input derived from a user's social network. A description of a product selected for purchase by a user is received. A social networking site is searched for information relevant to a characterization the product. The relevant information is characterized according to a social relationship between the user and an other member of the social networking site, a product family of the product, and a product expertise of the other member about the product. Characterized information about the product is then presented to the user.

Подробнее
06-04-2017 дата публикации

EXECUTION OF PARSED COMMANDS

Номер: US20170097750A1
Принадлежит:

A computer-implemented method for executing parsed commands includes receiving an area selection in a first user interface on an electronic device. The method receiving a first portion of a command entry in the first user interface. The method translating the first portion of the command entry into a first portion of computer readable text format. The method parsing the first portion of computer readable text format for keywords, wherein the keywords correspond to actions executed in a first application. Responsive to determining the first portion of computer readable text format matches a first action, the method executing the first action in the first application, wherein the first action is directed towards the area selection. 1. A method comprising:receiving, by one or more processors, an area selection in a first user interface on an electronic device;receiving, by one or more processors, a first portion of a command entry in the first user interface;translating, by one or more processors, the first portion of the command entry into a first portion of computer readable text format;parsing, by one or more processors, the first portion of computer readable text format for keywords, wherein the keywords correspond to actions executed in a first application; andresponsive to determining the first portion of computer readable text format matches a first action, executing, by one or more processors, the first action in the first application, wherein the first action is directed towards the area selection.2. The method of claim 1 , further comprising:searching, by one or more processors, a list of pre-defined commands for the first portion of the command entry; andresponsive to identifying a first pre-defined command with the first portion of the command entry, generating, by one or more processors, a second portion of the command entry to complete the first pre-defined command in the first user interface.3. The method of claim 1 , further comprising:searching, by one ...

Подробнее
26-06-2014 дата публикации

Recommending electronic content based upon user availability

Номер: US20140180991A1
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide a system, method, and program product for recommending a digital publication. A computing device identifies a time interval for consuming a digital publication, based on schedule information in an electronic calendar. The computing device determines, based on characteristics of the time interval and a criteria, a digital publication, from a plurality of digital publications, for human consumption within the identified time interval.

Подробнее
26-06-2014 дата публикации

RECOMMENDING ELECTRONIC CONTENT BASED UPON USER AVAILABLITY

Номер: US20140181001A1

Embodiments of the present invention provide a system, method, and program product for recommending a digital publication. A computing device identifies a time interval for consuming a digital publication, based on schedule information in an electronic calendar. The computing device determines, based on characteristics of the time interval and a criteria, a digital publication, from a plurality of digital publications, for human consumption within the identified time interval. 1. A method for recommending a digital publication , the method comprising:a computing device identifying a time interval for consuming a digital publication, based on schedule information in an electronic calendar; andthe computing device determining, based on characteristics of the time interval and a criteria, a digital publication, from a plurality of digital publications, for human consumption within the identified time interval.2. The method of claim 1 , wherein the characteristics of the time interval include one or more of:day of the week of the time interval;context of the time interval;start time and end time of the time interval;whether the time interval is indicated as available; orwhether there is a time interval adjacent to the identified time interval that is indicated as available.3. The method of claim 2 , wherein context includes one or more of:purpose;whether the time interval is reoccurring;whether the time interval spans an entire day; orwhether there is a special notation associated with the time interval.4. The method of claim 1 , wherein the criteria includes one or more of:a user profile;a digital publication profile; ora purchase price range of a digital publication.5. The method of claim 4 , wherein the user profile includes one or more of: user age; gender; education; health considerations; commute schedule; or digital publication recommendations.6. The method of claim 4 , wherein the digital publication profile includes one or more of: genre; author; readability ...

Подробнее
16-04-2015 дата публикации

UTILIZING SOCIAL INFORMATION FOR RECOMMENDING AN APPLICATION

Номер: US20150106350A1

Utilizing social information for recommending an application includes providing an application recommendation system based on social characterizations, and responsive to a user searching for an application meeting a criteria, utilizing the application recommendation system by searching for applications meeting the criteria, characterizing the applications according to a social proximity factor to the user, and presenting the applications ordered by the social proximity factor. 1. A computer program product for utilizing social information for recommending an application , comprising:a tangible computer readable storage medium, said tangible computer readable storage medium comprising computer readable program code embodied therewith, said computer readable program code comprising program instructions that, when executed, causes a processor to:provide an application recommendation system based on social characterizations; andresponsive to a user searching for an application meeting a criteria, utilizing said application recommendation system to:search for applications meeting said criteria;characterize said applications according to a social proximity factor to said user; andpresent said applications ordered by said social proximity factor.2. The computer program product claim 1 , wherein said criteria is selected from a group consisting of a search string claim 1 , a category claim 1 , a social network claim 1 , an individual claim 1 , an organization claim 1 , and combinations thereof.3. The computer program product claim 1 , further comprising computer readable program code comprising program instructions that claim 1 , when executed claim 1 , causes said processor to present an alternative recommendation responsive to identifying problems with said applications.4. The computer program product claim 3 , wherein said alternative recommendation is based on similarities to said applications.5. The computer program product claim 3 , wherein said alternative ...

Подробнее
16-04-2015 дата публикации

AUTOMATED COMPOSITION OF TOPICAL MEDIA

Номер: US20150106351A1

Embodiments of the present invention provide a method, system and computer program product for the automated composition of topical media. In an embodiment of the invention, a method for the automated composition of topical media is provided. The method includes specifying a topic of interest in a search engine interface of a search engine. The method also includes searching one or more media stores over a computer communications network for media files pertaining to the specified topic and retrieving one or more media files including portions corresponding to the specified topic. Finally, the method includes compositing the portions into a single media file and storing into fixed storage the single media file. 1. A media retrieval data processing system configured for the automated composition of topical media , the system comprising:a host computing system comprising at least one computer with memory and at least one processor;a media file search engine executing in the memory of the host computing system and operable to search communicatively linked media stores for media files pertaining to a specified topic; and,an automated composition module coupled to the media file search engine, the module comprising program code that when executed in the memory of the host computing system directs the media file search engine to search the media stores for media files pertaining to the specified topic, retrieves by way of the media file search engine one or more media files including portions corresponding to the specified topic, composites the portions into a single media file, and returns the single media file to a requesting client.2. The system of claim 1 , wherein the module retrieves the one or more media files by additionally specifying in the search engine one or more subtopics of the topic of interest and by retrieving multiple different media files including portions corresponding to the one or more subtopics of the topic of interest.3. The system of claim 2 , ...

Подробнее
16-04-2015 дата публикации

Automated composition of topical media

Номер: US20150106354A1
Принадлежит: International Business Machines Corp

Embodiments of the present invention provide a method, system and computer program product for the automated composition of topical media. In an embodiment of the invention, a method for the automated composition of topical media is provided. The method includes specifying a topic of interest in a search engine interface of a search engine. The method also includes searching one or more media stores over a computer communications network for media files pertaining to the specified topic and retrieving one or more media files including portions corresponding to the specified topic. Finally, the method includes compositing the portions into a single media file and storing into fixed storage the single media file.

Подробнее
16-04-2015 дата публикации

Utilizing social information for recommending an application

Номер: US20150106367A1
Принадлежит: International Business Machines Corp

Utilizing social information for recommending an application includes providing an application recommendation system based on social characterizations, and responsive to a user searching for an application meeting a criteria, utilizing the application recommendation system by searching for applications meeting the criteria, characterizing the applications according to a social proximity factor to the user, and presenting the applications ordered by the social proximity factor.

Подробнее
03-07-2014 дата публикации

PRINT JOB DISTRIBUTION WITHIN A PRINTING SYSTEM

Номер: US20140185078A1

Disclosed are a method, computer program product, and system for print job distribution. An amount of available consumable resources for each of a plurality of printers is determined. An estimated usage of the consumable resources for the plurality of printers for one or more printer jobs in a printer queue is determined. A maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers is accessed. A print distribution plan for each print job in the printer queue is determined, based at least in part on the amount of available consumable resources for each of the plurality of printers, the estimated usage of consumable resources for the plurality of printers for each printer job in a printer queue, and the maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers. 1. A method for print job distribution , the method comprising:determining an amount of a first consumable resource for each of a plurality of printers;determining an estimated usage of the first consumable resource for each of the plurality of printers for one or more printer jobs in a printer queue;accessing a predetermined maintenance schedule for replacing the first consumable resource for each of the plurality of printers; anddetermining a print distribution plan for each print job in the printer queue based at least in part on the amount of the first consumable resource for each of the plurality of printers, the estimated usage of the first consumable resource for the plurality of printers for each printer job in a printer queue, and the predetermined maintenance schedule for replacing the first consumable resource for each of the plurality of printers,wherein:the print distribution plan operates to decrease the amount of the first consumable resource wasted upon being replaced based on the predetermined maintenance schedule; andthe print distribution plan operates to minimize the amount of ...

Подробнее
03-07-2014 дата публикации

PRINT JOB DISTRIBUTION WITHIN A PRINTING SYSTEM

Номер: US20140185084A1

Disclosed are a method, computer program product, and system for print job distribution. An amount of available consumable resources for each of a plurality of printers is determined. An estimated usage of the consumable resources for the plurality of printers for one or more printer jobs in a printer queue is determined. A maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers is accessed. A print distribution plan for each print job in the printer queue is determined, based at least in part on the amount of available consumable resources for each of the plurality of printers, the estimated usage of consumable resources for the plurality of printers for each printer job in a printer queue, and the maintenance schedule related to the maintenance of the consumable resources for each of the plurality of printers. 15-. (canceled)6. A computer program product for print job distribution , the computer program product comprising:one or more non-transitory computer-readable storage media and program instructions stored on the one or more computer-readable storage media, the program instructions comprising:program instructions to determine an amount of a first consumable resource for each of a plurality of printers;program instructions to determine an estimated usage of the first consumable resource for each of the plurality of printers for one or more printer jobs in a printer queue;program instructions to access a predetermined maintenance schedule for replacing the first consumable resource for each of the plurality of printers; andprogram instructions to determine a print distribution plan for each print job in the printer queue based at least in part on the amount of the first consumable resource for each of the plurality of printers, the estimated usage of the first consumable resource for the plurality of printers for each printer job in a printer queue, and the predetermined maintenance schedule for ...

Подробнее
03-07-2014 дата публикации

STREAMING MEDIA BUFFER POINTS REFLECTING USER BEHAVIOR AND INTERESTS

Номер: US20140186009A1

A method of handling streaming media includes identifying multiple seek points within media data streamed from a media source to a media player. A segment of the media data stream is buffered at each seek point. A graphical user interface illustrates the positions of the multiple seek points along a progress bar and identifies, for each of the multiple seek points, the source that provided the seek point. The method monitors for user input selecting a seek point from among the multiple seek points, and sets the selected seek point as a current playback point. The source of each seek point may, for example, be illustrated with a source identifying color, icon, or text description. 115-. (canceled)16. A computer program product including computer usable program code embodied on a tangible computer usable storage medium , the computer program product comprising:computer usable program code for identifying multiple seek points within a stream of media data streamed from a media source to a media player;computer usable program code for buffering a segment of the stream of media data at each of the multiple seek points;computer usable program code for providing a graphical user interface illustrating the positions of the multiple seek points along a progress bar and identifying, for each of the multiple seek points, the source that provided the seek point;computer usable program code for monitoring for user input selecting a seek point from among the multiple seek points; andcomputer usable program code for setting the selected seek point as a current playback point.17. The computer program product of claim 16 , wherein the multiple seek points are provided by at least two different sources claim 16 , and wherein at least one of the sources is external to a device that operates the media player.18. The computer program product of claim 16 , wherein claim 16 , for each of the multiple seek points claim 16 , the source of the seek point is identified by an appearance that ...

Подробнее
23-04-2015 дата публикации

CONTROLLING ACCESS TO AN INTRAVENOUS CATHETER

Номер: US20150112315A1

A system includes an intravenous catheter having a catheter chamber, a catheter line for insertion into a blood vessel of the identified patient, and an electronically actuatable blocking member providing selective fluid communication between the catheter chamber and the catheter line. A reader is secured to the catheter chamber for reading an identification code that identifies a liquid in a syringe received within the catheter chamber. A control system accesses an electronic patient record that includes medical information specific to an identified patient and runs an application program logically associating the intravenous catheter and the medical information specific to the identified patient, determining whether the administration of the identified liquid to the identified patient is compatible within the medical information specific to the identified patient, and controlling electronic actuation of the blocking member. 1. A system , comprising:an intravenous catheter having a catheter chamber, a catheter line for insertion into a blood vessel of the identified patient, and an electronically actuatable blocking member providing selective fluid communication between the catheter chamber and the catheter line;a reader secured to the catheter chamber for reading an identification code of a syringe received within the catheter chamber, wherein the identification code identifies a liquid contained in the syringe; anda control system having access to a computer readable storage medium storing an electronic patient record that includes medical information specific to an identified patient, wherein the control system is in communication with the reader and runs an application program logically associating the intravenous catheter and the medical information specific to the identified patient, determining whether the administration of the identified liquid to the identified patient is compatible within the medical information specific to the identified patient, and ...

Подробнее
23-04-2015 дата публикации

CONTROLLING ACCESS TO AN INTRAVENOUS CATHETER

Номер: US20150112316A1

A method includes logically associating an intravenous catheter and an electronic patient record stored on a computer readable storage medium, wherein the electronic patient record includes medical information specific to an identified patient. An identification code of a syringe to be administered to the identified patient is read in order to identify a liquid contained in the syringe. The blocking member may be electronically actuated to provide fluid communication between a catheter chamber and a catheter line inserted into the identified patient, wherein the fluid communication is provided only while the syringe is received within the catheter chamber and only in response to determining that administration of the identified liquid to the identified patient is compatible within the medical information. 1. A method , comprising:logically associating an intravenous catheter and an electronic patient record stored on a computer readable storage medium, wherein the electronic patient record includes medical information specific to an identified patient;reading an identification code of a syringe to be administered to the identified patient, wherein the identification code identifies a liquid contained in the syringe; andelectronically actuating a blocking member to provide fluid communication between a catheter chamber and a catheter line inserted into the identified patient, wherein the fluid communication is provided only while the syringe is received within the catheter chamber and only in response to determining that administration of the identified liquid to the identified patient is compatible within the medical information specific to the identified patient.2. The method of claim 1 , wherein logically associating an electronic patient record and an intravenous catheter claim 1 , includes storing a logical association between a patient identification code and an electronically readable serial number of the catheter.3. The method of claim 1 , wherein the ...

Подробнее
03-07-2014 дата публикации

STREAMING MEDIA BUFFER POINTS REFLECTING USER BEHAVIOR AND INTERESTS

Номер: US20140189735A1

A method of handling streaming media includes identifying multiple seek points within media data streamed from a media source to a media player. A segment of the media data stream is buffered at each seek point. A graphical user interface illustrates the positions of the multiple seek points along a progress bar and identifies, for each of the multiple seek points, the source that provided the seek point. The method monitors for user input selecting a seek point from among the multiple seek points, and sets the selected seek point as a current playback point. The source of each seek point may, for example, be illustrated with a source identifying color, icon, or text description. 1. A method , comprising:identifying multiple seek points within a stream of media data streamed from a media source to a media player;buffering a segment of the stream of media data at each of the multiple seek points;providing a graphical user interface illustrating the positions of the multiple seek points along a progress bar and identifying, for each of the multiple seek points, the source that provided the seek point;monitoring for user input selecting a seek point from among the multiple seek points; andsetting the selected seek point as a current playback point.2. The method of claim 1 , wherein the multiple seek points are provided by at least two different sources claim 1 , and wherein at least one of the sources is external to a device that operates the media player.3. The method of claim 1 , wherein each buffered segment is separated from each other buffered segment of the stream of media data by a segment of unbuffered data of the stream of media data.4. The method of claim 1 , wherein claim 1 , for each of the multiple seek points claim 1 , the source of the seek point is identified by an appearance that is unique to the source that provided the seek point.5. The method of claim 4 , wherein the appearance that is unique to the source or type of source includes color claim 4 , ...

Подробнее
03-07-2014 дата публикации

Inferring security decisions from trusted users

Номер: US20140189848A1
Принадлежит: International Business Machines Corp

Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application.

Подробнее
03-07-2014 дата публикации

Inferring Security Decisions From Trusted Users

Номер: US20140189849A1

Inferring security decisions from trusted users, including: identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device; identifying, by the security inference module, one or more trusted users; identifying, by the security inference module, trusted user installation activity associated with the candidate application; and determining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application. 1. A method of inferring security decisions from trusted users , the method comprising:identifying, by a security inference module on a computing device, a candidate application to be installed on the computing device;identifying, by the security inference module, one or more trusted users;identifying, by the security inference module, trusted user installation activity associated with the candidate application; anddetermining, by the security inference module, whether to install the candidate application in dependence upon the trusted user installation activity associated with the candidate application.2. The method of further comprising claim 1 , responsive to determining to install the candidate application claim 1 , installing the candidate application using trusted user preferences.3. The method of wherein identifying claim 1 , by the security inference module claim 1 , one or more trusted users further comprises specifying claim 1 , by a user of the computing device claim 1 , the one or more trusted users.4. The method of wherein identifying claim 1 , by the security inference module claim 1 , one or more trusted users further comprises identifying claim 1 , by the security inference module claim 1 , one or more trusted user installation activity types associated with each trusted user.5. The method of further comprising:tracking, by an installation activity tracking module on a ...

Подробнее
20-04-2017 дата публикации

Dynamic profile sharing using expiring tokens

Номер: US20170111366A1
Принадлежит: International Business Machines Corp

Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a destination location. An expiring token may be generated, associated with the user profile, and communicated to the second device. Access to the user profile provided to the destination device may be terminated upon an expiration of the expiring token.

Подробнее
20-04-2017 дата публикации

DYNAMIC PROFILE SHARING USING EXPIRING TOKENS

Номер: US20170111410A1
Принадлежит:

Access to a user profile of a user device at a location may be provided to a destination device upon detecting that the location is within a proximity of a destination location. An expiring token may be generated, associated with the user profile, and communicated to the second device. Access to the user profile provided to the destination device may be terminated upon an expiration of the expiring token. 1providing, by the user device, to a destination device, access to the user profile of the user device, upon detecting that a location of the user device is within a proximity of the destination device, wherein providing access to the user profile comprises receiving an input from a user of the user device to select the user profile from among a plurality of user profiles, wherein providing access to the user profile comprises prompting the user to allow generation of an expiring token and receiving an input from the user indicating permission to generate the expiring token, wherein the user profile includes at least one of electronic medical records, dining preferences, driving records, or shopping preferences, wherein the proximity is configurable by the user device, wherein the location is defined as a geographic area centered on a pair of latitude and longitude coordinates;generating, by the user device, the expiring token comprising a unique identification code, wherein expiration of the expiring token occurs upon detecting at least one of the proximity exceeding a threshold value or a defined time elapsing since generating the expiring token, wherein the defined time comprises a duration dynamically set by the user device during runtime of the method on the computer, and wherein the expiration of the token is further based on a token expiration policy defined by the user device during runtime, the token expiration policy comprising a selection by the user device of an expiration by time, location change, or both;associating, by the user device, the expiring ...

Подробнее
14-05-2015 дата публикации

Reactionary backup scheduling around meantime between failures of data origination

Номер: US20150134899A1
Принадлежит: International Business Machines Corp

A processor-implemented method for providing a reactionary backup scheduling of a hard disk drive is provided. The method may include monitoring a disk usage of the hard disk drive and comparing the disk usage to an MTBF of the hard disk drive. The method may also include monitoring usage of at least one file of a plurality of files stored on the hard disk drive. The method may further include initiating the reactionary backup scheduling based on the comparing of the disk usage to the MTBF and the monitoring of the usage of the at least one file in the plurality of files.

Подробнее
21-05-2015 дата публикации

METHOD TO PROVIDE A MORE ROBUST GFCI CIRCUIT BREAKER

Номер: US20150138677A1

A system and method include a ground fault circuit interrupter (GFCI) supplying electricity to an appliance. The GFCI supplies direct current (DC) to an appliance upon connection to the GFCI, and the appliance automatically communicates data to the GFCI prior to startup of the appliance in response to receiving the DC, wherein the data describes maximum out of phase conditions expected during appliance startup, and the GFCI acknowledges receipt of the data. The appliance sends a status message to the GFCI indicating the appliance is ready for alternating current (AC) in response to the startup of the appliance, and the GFCI switches from supplying the low voltage direct current to supplying AC to the appliance in response to the GFCI receiving the status message. The method further comprises preventing the GFCI from tripping in response to out of phase conditions less than the maximum out of phase conditions. 1. A system , comprising:a ground fault circuit interrupter supplying electrical power from an electrical power source to a receptacle, wherein the ground fault circuit interrupter includes a first multiplexer coupled to the receptacle, a first inter-integrated circuit device, and the electrical power source for selectively connecting the receptacle to the first inter-integrated circuit device or connecting the receptacle to the electrical power source, and wherein the ground fault circuit interrupter provides direct current to the receptacle when the first inter-integrated circuit device is connected to the receptacle and provides alternating current to the receptacle when the electrical power source is connected to the receptacle; andan appliance including a connector for selectively coupling to the receptacle, wherein the appliance includes a second inter-integrated circuit device, a load, and a second multiplexer coupled to the connector, the second inter-integrated circuit device, and the load for selectively connecting the connector to the second inter- ...

Подробнее
31-07-2014 дата публикации

LIMITING THE EXECUTION OF BACKGROUND MANAGEMENT OPERATIONS IN A DRIVE ARRAY

Номер: US20140215148A1

Limiting the execution of background management operations in a drive array, including: receiving a read instruction to read data from a memory drive in the drive array; determining whether the read instruction is associated with a write instruction to write data to a memory drive in the drive array; responsive to determining that the read instruction is associated with the write instruction, restricting performance of background management operations on the memory drive targeted by the write instruction; determining whether the write instruction has completed; and responsive to determining that the write instruction has completed, removing restrictions associated with the performance of background management operations on the memory drive targeted by the write instruction. 16-. (canceled)7. An apparatus for limiting the execution of background management operations in a drive array , the apparatus comprising a computer processor , a computer memory operatively coupled to the computer processor , the computer memory having disposed within it computer program instructions that , when executed , cause the apparatus to carry out the steps of:receiving, by a drive array controller, a read instruction to read data from a memory drive in the drive array;determining, by the drive array controller, whether the read instruction is associated with a write instruction to write data to a memory drive in the drive array;responsive to determining, by the drive array controller, that the read instruction is associated with the write instruction, restricting, by the drive array controller, performance of background management operations on the memory drive targeted by the write instruction;determining, by the drive array controller, whether the write instruction has completed; andresponsive to determining, by the drive array controller, that the write instruction has completed, removing, by the drive array controller, restrictions associated with the performance of background ...

Подробнее
31-07-2014 дата публикации

Limiting The Execution Of Background Management Operations In A Drive Array

Номер: US20140215150A1

Limiting the execution of background management operations in a drive array, including: receiving a read instruction to read data from a memory drive in the drive array; determining whether the read instruction is associated with a write instruction to write data to a memory drive in the drive array; responsive to determining that the read instruction is associated with the write instruction, restricting performance of background management operations on the memory drive targeted by the write instruction; determining whether the write instruction has completed; and responsive to determining that the write instruction has completed, removing restrictions associated with the performance of background management operations on the memory drive targeted by the write instruction. 1. A method of limiting the execution of background management operations in a drive array , the method comprising:receiving, by a drive array controller, a read instruction to read data from a memory drive in the drive array;determining, by the drive array controller, whether the read instruction is associated with a write instruction to write data to a memory drive in the drive array;responsive to determining, by the drive array controller, that the read instruction is associated with the write instruction, restricting, by the drive array controller, performance of background management operations on the memory drive targeted by the write instruction;determining, by the drive array controller, whether the write instruction has completed; andresponsive to determining, by the drive array controller, that the write instruction has completed, removing, by the drive array controller, restrictions associated with the performance of background management operations on the memory drive targeted by the write instruction.2. The method of wherein the read instruction includes metadata identifying whether the read instruction is related to the write instruction.3. The method of wherein determining whether ...

Подробнее
14-08-2014 дата публикации

ELECTRONIC MAP

Номер: US20140229284A1

A method includes, determining a zoom level for a selected portion of an electronic map, harvesting map data from the selected section the electronic map, determining building information from the harvested map data, obtaining branding information for the building information, and a user device receiving and populating said zoomed section of the electronic map with the branding information. 1. A method comprising:determining a zoom level for a selected portion of an electronic map,harvesting map data from the selected section the electronic map,determining building information from the harvested map data,obtaining branding information for the building information, anda user device receiving and populating said zoomed section of the electronic map with the branding information.2. The method according to claim 1 , wherein said branding information changes depending on the local time of day.3. The method according to claim 1 , wherein said branding information changes depending on the viewing quantity of the zoomed section of said electronic map.4. The method according to claim 1 , wherein said branding information changes depending on an event occurring within the zoomed section of said electronic map.5. The method according to claim 1 , wherein said building information further includes determining tenant information.6. The method according to claim 1 , further comprising having advertisements on the user device within said populated zoomed section of electronic map along with said branding information.7. The method according to claim 6 , further comprising varying the size of said advertisement and branding information.8. The method according to claim 7 , wherein said advertisement size and branding information is based upon fee payments.9. The method according to claim 6 , wherein said advertisement and branding information size is based upon the geographical location of a user versus said zoomed section of said electronic map.10. A computer system comprising:one ...

Подробнее
25-05-2017 дата публикации

TIME-BASED SCHEDULING FOR TOUCHSCREEN ELECTRONIC DEVICES

Номер: US20170147111A1
Принадлежит:

Aspects relate to touchscreen electronic devices, methods, systems, and computer program products for detecting, by a processor in a touchscreen electronic device, a user-defined time detected along a time-based touch region located at an edge of a face of the touchscreen electronic device; generating an inquiry based on the detected user-defined time; transmitting the inquiry to at least one remote resource; receiving at the touchscreen electronic device time-sensitive information from the at least one remote resource; and displaying the time-sensitive information on the face of the touchscreen electronic device. 1. A touchscreen electronic device comprising:a touchscreen having a face defining an edge;a processor configured to control the touchscreen electronic device, wherein the processor is configured to control images displayed on the face and detect user input through the touchscreen; anda time-based touch region defined at the edge of the face, the time-based touch region having a plurality of positions mapped to points around the edge, wherein each position of the plurality of positions corresponds to a time on a traditional analog clock face.2. The touchscreen electronic device of claim 1 , wherein the processor is configured detect a user input at one or more of the positions on the time-based touch region and generate an inquiry based on the user input.3. The touchscreen electronic device of claim 2 , wherein the touchscreen electronic device is configured to transmit the inquiry to a remote resource.4. The touchscreen electronic device of claim 3 , wherein the touchscreen electronic device is configured to receive time-sensitive information related to the inquiry from the remote resource and display the time-sensitive information on the face of the touchscreen electronic device.5. The touchscreen electronic device of claim 1 , wherein the touchscreen electronic device is one of a smartwatch claim 1 , a smartphone claim 1 , or a tablet.6. The touchscreen ...

Подробнее
25-05-2017 дата публикации

TIME-BASED SCHEDULING FOR TOUCHSCREEN ELECTRONIC DEVICES

Номер: US20170147167A1
Принадлежит:

Aspects relate to touchscreen electronic devices, methods, systems, and computer program products for detecting, by a processor in a touchscreen electronic device, a user-defined time detected along a time-based touch region located at an edge of a face of the touchscreen electronic device; generating an inquiry based on the detected user-defined time; transmitting the inquiry to at least one remote resource; receiving at the touchscreen electronic device time-sensitive information from the at least one remote resource; and displaying the time-sensitive information on the face of the touchscreen electronic device. 1. A computer implemented method to display time-sensitive information on a touchscreen electronic device , the method comprising:detecting, by a processor in the touchscreen electronic device, a user-defined time detected along a time-based touch region located at an edge of a face of the touchscreen electronic device;generating an inquiry based on the user-defined time;transmitting the inquiry to at least one remote resource;receiving time-sensitive information from the at least one remote resource; anddisplaying the time-sensitive information on the face of the touchscreen electronic device.2. The computer implemented method of claim 1 , wherein the time-based touch region includes a plurality of positions mapped to points around the edge claim 1 , wherein each position of the plurality of positions corresponds to a time on a traditional analog clock face.3. The computer implemented method of claim 1 , wherein the user-defined time is one of a specific time and a range of time.4. The computer implemented method of claim 1 , wherein the touchscreen electronic device is one of a smartwatch claim 1 , a smartphone claim 1 , or a tablet.5. The computer implemented method of claim 1 , wherein the transmitting and receiving are performed over a dedicated communication link between the touchscreen electronic device and the at least one resource.6. The computer ...

Подробнее
04-06-2015 дата публикации

FILE ACCESS OPTIMIZATION USING STRATEGICALLY PARTITIONED AND POSITIONED DATA IN CONJUNCTION WITH A COLLABORATIVE PEER TRANSFER SYSTEM

Номер: US20150156264A1

A processor-implemented method for optimizing a file transfer is provided. The method may include receiving at least one file transfer request associated with a file. The method may further include acquiring, for the at least one file transfer request, a plurality of service level objectives associated with the file. The method may also include distributing a plurality of file segments associated with the file to at least one storage component associated with a shared storage infrastructure, wherein the distributing is based on a determining of at least one resource capability associated with the at least one storage component. Additionally, the method may include directing a complete transfer of the plurality of file segments associated with the file from the at least one storage component based on a file request for the file. 1. A processor-implemented method for optimizing a file transfer , the method comprising:receiving at least one file transfer request associated with a file;acquiring, for the at least one file transfer request, a plurality of service level objectives associated with the file;distributing a plurality of file segments associated with the file to at least one storage component associated with a shared storage infrastructure, wherein the distributing is based on a determining of at least one resource capability associated with the at least one storage component; anddirecting a complete transfer of the plurality of file segments associated with the file from the at least one storage component based on a file request for the file.2. The method of claim 1 , further comprising:recording a transfer rate for at least one segment in the plurality of file segments from a respective storage component, wherein the transfer rate is in response to at least one service level objective for maintaining a target rate of transfer in a specific period of time.3. The method of claim 1 , wherein the plurality of service level objectives associated with the file ...

Подробнее
11-06-2015 дата публикации

CHANGING APPLICATION PRIORITY IN RESPONSE TO DETECTING MULTIPLE USERS

Номер: US20150161063A1

A computer program product is provided including computer readable program code for running an application on a computer having a display, wherein the application requires external network access. The computer program product further includes computer readable program code for determining a number of people gathered around the computer, and computer readable program code for automatically changing the network priority of the application as a function of the number of people determined to be gathered around the computer. The number of people gathered around the computer is preferably determined using a facial recognition module to analyze an image captured by a camera of the computer or using a speech recognition module to analyze sound captured by a microphone of the computer. 1. A computer program product including computer readable program code embodied on a computer readable storage medium , the computer program product comprising:computer readable program code for running an application on a computer having a peripheral device, wherein the application requires external network access and produces an output to the peripheral device;computer readable program code for determining a number of people proximate to the peripheral device; andcomputer readable program code for automatically changing the priority of the application as a function of the number of people proximate to the peripheral device.2. The computer program product of claim 1 , wherein the priority of the application is selected from network priority claim 1 , provisioning priority claim 1 , and combinations thereof.3. The computer program product of claim 1 , further comprising:computer readable program code for detecting an interruption in performance of the application on the computer, wherein the network priority of the application is increased in response to the interruption.4. The computer program product of claim 1 , further comprising:computer readable program code for detecting an interruption ...

Подробнее
11-06-2015 дата публикации

DATA RE-ROUTING FOR SPECIFIC END USER AVOIDANCE

Номер: US20150163128A1

Embodiments of the present invention provide a method, system and computer program product for data routing alteration to avoid a specified end user. In an embodiment of the invention, a method for data re-routing for specific end user avoidance includes receiving a request to route a file to a primary location and identifying an end user excluded from accessing the document. The method also includes computing a likelihood that the excluded end user may contemporaneously access the primary location. Finally, the method includes responding to a determination that the excluded end user is likely to contemporaneously access the primary location by taking corrective measures to re-route the file to an alternate location. 1. A method for data re-routing for specific end user avoidance comprising:receiving a request to route a file to a primary location;identifying an end user excluded from accessing the file;computing a likelihood that the excluded end user may contemporaneously access the primary location; and,responsive to a determination that the excluded end user is likely to contemporaneously access the primary location, taking corrective measures to re-route the file to an alternate location.2. The method of claim 1 , wherein the primary location is a primary printer and the alternate location is an alternate printer.3. The method of claim 1 , wherein the primary location is a primary file repository and the alternate location is an alternate file repository.4. The method of claim 1 , wherein the excluded end user is identified by parsing the file to recognize a reference to the excluded end user.5. The method of claim 2 , wherein the likelihood is computed based upon the contemporaneous existence of a print job in a print queue of the primary printer.6. The method of claim 3 , wherein the likelihood is computed based upon the presence of a contemporaneously stored file of the excluded end user at the primary file repository.7. A data processing system configured ...

Подробнее
11-06-2015 дата публикации

CHANGING APPLICATION PRIORITY IN RESPONSE TO DETECTING MULTIPLE USERS

Номер: US20150163308A1

A method is provided including running an application on a computer having a display, wherein the application requires external network access. The method further includes determining a number of people gathered around the computer, and automatically changing the network priority of the application as a function of the number of people determined to be gathered around the computer. The number of people gathered around the computer is preferably determined using a facial recognition module to analyze an image captured by a camera of the computer or using a speech recognition module to analyze sound captured by a microphone of the computer. 1. A method , comprising:running an application on a computer having a peripheral device, wherein the application requires external network access and produces an output to the peripheral device;determining a number of people proximate to the peripheral device; andautomatically changing the priority of the application as a function of the number of people proximate to the peripheral device.2. The method of claim 1 , wherein the priority of the application is selected from network priority claim 1 , provisioning priority claim 1 , and combinations thereof.3. The method of claim 1 , further comprising:detecting an interruption in performance of the application on the computer, wherein the network priority of the application is increased in response to the interruption.4. The method of claim 1 , further comprising:detecting an interruption in performance of the application on the computer, wherein the provisioning priority of the application is increased in response to the interruption.5. The method of claim 2 , wherein the application is a web browser and the peripheral device is a display screen.6. The method of claim 5 , wherein the web browser receives a video file over the external network and displays the video on the display claim 5 , and wherein priority of the web browser is increased to maintain a predetermined amount of ...

Подробнее
11-06-2015 дата публикации

PROJECTED CALL DURATION VALUES BASED ON AMBIENT CONDITIONS

Номер: US20150163351A1

A computer program product includes computer readable program code for detecting one or more ambient conditions using one or more components of a first communication device, computer readable program code for determining a projected call duration value for the first communication device as a function of the one or more detected ambient conditions, and computer readable program code for providing the projected call duration value to a second communication device prior to the second communication device connecting a call between the first and second communication devices. The second communication will preferably display the projected call duration value to the user to assist the user in deciding whether to initiate a call with the first communication device. 1. A computer program product including computer readable program code embodied on a computer readable storage medium , the computer program product including:computer readable program code for detecting one or more ambient conditions using one or more components of a first communication device;computer readable program code for determining a projected call duration value for the first communication device as a function of the one or more detected ambient conditions; andcomputer readable program code for providing the projected call duration value to a second communication device prior to connecting a call between the first and second communication devices.2. The computer program product of claim 1 , wherein the second communication device displays the projected call duration value received from the first communication device along with an identifier of the first communication device.3. The computer program product of claim 1 , wherein computer readable program code for determining a projected call duration value for the first communication device as a function of the one or more ambient conditions claim 1 , includes computer readable program code for identifying a projected call duration value stored in ...

Подробнее
11-06-2015 дата публикации

PROJECTED CALL DURATION VALUES BASED ON AMBIENT CONDITIONS

Номер: US20150163357A1

A method includes detecting one or more ambient conditions using one or more components of a first communication device, determining a projected call duration value for the first communication device as a function of the one or more detected ambient conditions, and providing the projected call duration value to a second communication device prior to the second communication device connecting a call between the first and second communication devices. The second communication will preferably display the projected call duration value to the user to assist the user in deciding whether to initiate a call with the first communication device. 1. A method , comprising:detecting one or more ambient conditions using one or more components of a first communication device;determining a projected call duration value for the first communication device as a function of the one or more detected ambient conditions; andproviding the projected call duration value to a second communication device prior to connecting a call between the first and second communication devices.2. The method of claim 1 , wherein the second communication device displays the projected call duration value received from the first communication device along with an identifier of the first communication device.3. The method of claim 1 , wherein determining a projected call duration value for the first communication device as a function of the one or more ambient conditions claim 1 , includes identifying a projected call duration value stored in association with the one or more ambient conditions.4. The method of claim 3 , wherein the projected call duration value associated with a selected one of the ambient conditions is a predetermined call duration value manually entered and stored by the first communication device.5. The method of claim 1 , wherein determining a projected call duration value for the first communication device as a function of the one or more ambient conditions claim 1 , includes automatically ...

Подробнее
18-06-2015 дата публикации

DETERMINING PROBABLE TOPICS OF CONVERSATION BETWEEN USERS OF TWO COMMUNICATION DEVICES

Номер: US20150172461A1

A computer program product includes computer readable program code for identifying a proposed call between a caller using a first communication device and a recipient using a second communication device, computer readable program code for determining probable topics of conversation of the proposed call, and computer readable program code for displaying the probable topics of conversation on either the first communication device, the second communication device or both the first and second communication devices before the proposed call is connected. 1. A computer program product including computer readable program code embodied on a computer readable storage medium , the computer program product comprising:computer readable program code for identifying a proposed call between a caller using a first communication device and a recipient using a second communication device;computer readable program code for determining probable topics of conversation of the proposed call; andcomputer readable program code for displaying the probable topics of conversation on either the first communication device, the second communication device, or both the first and second communication devices before the proposed call is connected.2. The computer program product of claim 1 , wherein the computer readable program code for displaying the probable topics of conversation includes computer readable program code for indicating which of the probable topics of conversation are favored for discussion claim 1 , which of the probable topics of conversation should be avoided claim 1 , or which of the probable topics are tentatively acceptable for discussion.3. The computer program product of claim 1 , where the computer readable program code for determining a probable topic of conversation of the proposed call includes computer readable program code for analyzing a previous conversation between the caller using the first communication device and the recipient using the second communication device ...

Подробнее
18-06-2015 дата публикации

DETERMINING PROBABLE TOPICS OF CONVERSATION BETWEEN USERS OF TWO COMMUNICATION DEVICES

Номер: US20150172462A1

A method includes identifying a proposed call between a caller using a first communication device and a recipient using a second communication device, determining probable topics of conversation of the proposed call, and displaying the probable topics of conversation on either the first communication device, the second communication device or both the first and second communication devices before the proposed call is connected. 1. A method , comprising:identifying a proposed call between a caller using a first communication device and a recipient using a second communication device;determining probable topics of conversation of the proposed call; anddisplaying the probable topics of conversation on either the first communication device, the second communication device or both the first and second communication devices before the proposed call is connected.2. The method of claim 1 , wherein displaying the probable topics of conversation includes indicating which of the probable topics of conversation are favored for discussion claim 1 , which of the probable topics of conversation should be avoided claim 1 , or which of the probable topics are tentatively acceptable for discussion.3. The method of claim 1 , where determining a probable topic of conversation of the proposed call includes analyzing a previous conversation between the caller using the first communication device and the recipient using the second communication device to identify keywords associated with a probable topic of conversation.4. The method of claim 1 , where determining a probable topic of conversation of the proposed call includes analyzing the most recent conversations involving the caller using the first communication device to identify keywords associated with a probable topic of conversation.5. The method of claim 4 , increasing the probability of a probable topic of conversation in response to detecting if the probable topic of conversation has seen an increase in prevalence on news ...

Подробнее
16-06-2016 дата публикации

Pro-active protection of communication devices that are senstive to vibration or shock

Номер: US20160171994A1
Принадлежит: International Business Machines Corp

A communication device includes a vibroscope or an accelerometer for detecting vibration or shock, a hard disk drive for storing data, and a wireless communication transceiver. In response to detecting vibration or shock, the communication device automatically broadcasts an alert message that identifies a physical location of the communication device at the time that the vibration or shock is sensed. In response to receiving an alert message from another communication device, the communication device automatically temporarily parks a read-write head of the hard disk drive to prevent damage from the vibration or shock.

Подробнее
11-09-2014 дата публикации

Writing Data To A Thermally Sensitive Memory Device

Номер: US20140254278A1

Writing data to a thermally sensitive memory device, including: receiving a physical layout of the thermally sensitive memory device; receiving the direction of airflow across the thermally sensitive memory device; selecting an address for writing data to the thermally sensitive memory device in dependence upon the physical layout of the thermally sensitive memory device and the direction of airflow across the thermally sensitive memory device; and writing data to the selected address of the thermally sensitive memory device.

Подробнее
11-09-2014 дата публикации

Writing Data To A Thermally Sensitive Memory Device

Номер: US20140254279A1

Writing data to a thermally sensitive memory device, including: receiving a physical layout of the thermally sensitive memory device; receiving the direction of airflow across the thermally sensitive memory device; selecting an address for writing data to the thermally sensitive memory device in dependence upon the physical layout of the thermally sensitive memory device and the direction of airflow across the thermally sensitive memory device; and writing data to the selected address of the thermally sensitive memory device.

Подробнее
11-09-2014 дата публикации

Allocating Enclosure Cache In A Computing System

Номер: US20140258631A1

Allocating enclosure cache in a computing system that includes an enclosure and a plurality of enclosure attached servers, including: receiving, by the enclosure, memory access information from each of the plurality of enclosure attached servers; determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate as shared cache that can be accessed by two or more of the enclosure attached servers; and determining, by the enclosure in dependence upon the memory access information, an amount of enclosure cache to allocate to each enclosure attached server for exclusive use by the enclosure attached server.

Подробнее
11-09-2014 дата публикации

Sharing Cache In A Computing System

Номер: US20140258632A1

Sharing cache in a computing system that includes a plurality of enclosure attached servers, including: identifying, by an enclosure, a first enclosure attached server that is not meeting a first predetermined performance threshold; identifying, by the enclosure, a second enclosure attached server that is meeting a second predetermined performance threshold; blocking, by the enclosure, access to a predetermined amount of cache on the second enclosure attached server by the second enclosure attached server; determining, by the enclosure, whether the second enclosure attached server is meeting the second predetermined performance threshold; responsive to determining that the second enclosure attached server is meeting the second predetermined performance threshold, lending, by the enclosure, the predetermined amount of cache on the second enclosure attached server to the first enclosure attached server.

Подробнее
11-09-2014 дата публикации

Sharing Cache In A Computing System

Номер: US20140258633A1

Sharing cache in a computing system that includes a plurality of enclosure attached servers, including: identifying, by an enclosure, a first enclosure attached server that is not meeting a first predetermined performance threshold; identifying, by the enclosure, a second enclosure attached server that is meeting a second predetermined performance threshold; blocking, by the enclosure, access to a predetermined amount of cache on the second enclosure attached server by the second enclosure attached server; determining, by the enclosure, whether the second enclosure attached server is meeting the second predetermined performance threshold; responsive to determining that the second enclosure attached server is meeting the second predetermined performance threshold, lending, by the enclosure, the predetermined amount of cache on the second enclosure attached server to the first enclosure attached server.

Подробнее